full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/1812.ps1
1812.ps1
Describe "Remove-Item" -Tags "CI" { $testpath = $TestDrive $testfile = "testfile.txt" $testfilepath = Join-Path -Path $testpath -ChildPath $testfile Context "File removal Tests" { BeforeEach { New-Item -Name $testfile -Path $testpath -ItemType "file" -Value "lorem ipsum" -Force Test-Path $testfilepath | Should -BeTrue } It "Should be able to be called on a regular file without error using the Path parameter" { { Remove-Item -Path $testfilepath } | Should -Not -Throw Test-Path $testfilepath | Should -BeFalse } It "Should be able to be called on a file without the Path parameter" { { Remove-Item $testfilepath } | Should -Not -Throw Test-Path $testfilepath | Should -BeFalse } It "Should be able to call the rm alias" { { rm $testfilepath } | Should -Not -Throw Test-Path $testfilepath | Should -BeFalse } It "Should be able to call the del alias" { { del $testfilepath } | Should -Not -Throw Test-Path $testfilepath | Should -BeFalse } It "Should be able to call the erase alias" { { erase $testfilepath } | Should -Not -Throw Test-Path $testfilepath | Should -BeFalse } It "Should be able to call the ri alias" { { ri $testfilepath } | Should -Not -Throw Test-Path $testfilepath | Should -BeFalse } It "Should not be able to remove a read-only document without using the force switch" { Set-ItemProperty -Path $testfilepath -Name IsReadOnly -Value $true { Remove-Item $testfilepath -ErrorAction SilentlyContinue } | Should -Not -Throw Test-Path $testfilepath | Should -BeTrue Remove-Item $testfilepath -Force Test-Path $testfilepath | Should -BeFalse } It "Should be able to remove all files matching a regular expression with the include parameter" { New-Item -Name file1.txt -Path $testpath -ItemType "file" -Value "lorem ipsum" New-Item -Name file2.txt -Path $testpath -ItemType "file" -Value "lorem ipsum" New-Item -Name file3.txt -Path $testpath -ItemType "file" -Value "lorem ipsum" Remove-Item (Join-Path -Path $testpath -ChildPath "*") -Include file*.txt Test-path (Join-Path -Path $testpath -ChildPath file1.txt) | Should -BeFalse Test-path (Join-Path -Path $testpath -ChildPath file2.txt) | Should -BeFalse Test-path (Join-Path -Path $testpath -ChildPath file3.txt) | Should -BeFalse Test-Path $testfilepath | Should -BeTrue Remove-Item $testfilepath Test-Path $testfilepath | Should -BeFalse } It "Should be able to not remove any files matching a regular expression with the exclude parameter" { New-Item -Name file1.wav -Path $testpath -ItemType "file" -Value "lorem ipsum" New-Item -Name file2.wav -Path $testpath -ItemType "file" -Value "lorem ipsum" New-Item -Name file1.txt -Path $testpath -ItemType "file" -Value "lorem ipsum" Remove-Item (Join-Path -Path $testpath -ChildPath "file*") -Exclude *.wav -Include *.txt Test-Path (Join-Path -Path $testpath -ChildPath file1.wav) | Should -BeTrue Test-Path (Join-Path -Path $testpath -ChildPath file2.wav) | Should -BeTrue Test-Path (Join-Path -Path $testpath -ChildPath file1.txt) | Should -BeFalse Remove-Item (Join-Path -Path $testpath -ChildPath file1.wav) Remove-Item (Join-Path -Path $testpath -ChildPath file2.wav) Test-Path (Join-Path -Path $testpath -ChildPath file1.wav) | Should -BeFalse Test-Path (Join-Path -Path $testpath -ChildPath file2.wav) | Should -BeFalse } } Context "Directory Removal Tests" { $testdirectory = Join-Path -Path $testpath -ChildPath testdir $testsubdirectory = Join-Path -Path $testdirectory -ChildPath subd BeforeEach { New-Item -Name "testdir" -Path $testpath -ItemType "directory" -Force Test-Path $testdirectory | Should -BeTrue } It "Should be able to remove a directory" { { Remove-Item $testdirectory } | Should -Not -Throw Test-Path $testdirectory | Should -BeFalse } It "Should be able to recursively delete subfolders" { New-Item -Name "subd" -Path $testdirectory -ItemType "directory" New-Item -Name $testfile -Path $testsubdirectory -ItemType "file" -Value "lorem ipsum" $complexDirectory = Join-Path -Path $testsubdirectory -ChildPath $testfile test-path $complexDirectory | Should -BeTrue { Remove-Item $testdirectory -Recurse} | Should -Not -Throw Test-Path $testdirectory | Should -BeFalse } } }
combined_dataset/train/non-malicious/sample_19_93.ps1
sample_19_93.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Lists available operations for the Microsoft.Kusto provider. .Description Lists available operations for the Microsoft.Kusto provider. .Example {{ Add code here }} .Example {{ Add code here }} .Outputs Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IOperation .Link https://learn.microsoft.com/powershell/module/az.kusto/get-azkustooperation #> function Get-AzKustoOperation { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IOperation])] [CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)] param( [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ List = 'Az.Kusto.private\Get-AzKustoOperation_List'; } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } <# .Synopsis Checks that the data connection parameters are valid. .Description Checks that the data connection parameters are valid. .Example Invoke-AzKustoDataConnectionValidation -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" -DataConnectionName "myeventhubdc" -Location "East US" -Kind "EventHub" -EventHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.EventHub/namespaces/myeventhubns/eventhubs/myeventhub" -DataFormat "JSON" -ConsumerGroup 'Default' -Compression "None" -TableName "Events" -MappingRuleName "NewEventsMapping" .Example Invoke-AzKustoDataConnectionValidation -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" -DataConnectionName "myeventgriddc" -Location "East US" -Kind "EventGrid" -EventHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.EventHub/namespaces/myeventhubns/eventhubs/myeventhub" -StorageAccountResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.Storage/storageAccounts/mystorage" -DataFormat "JSON" -ConsumerGroup 'Default' -TableName "Events" -MappingRuleName "NewEventsMapping" .Example Invoke-AzKustoDataConnectionValidation -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" -DataConnectionName "myiothubdc" -Location "East US" -Kind "IotHub" -IotHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.Devices/IotHubs/myiothub" -SharedAccessPolicyName "myiothubpolicy" -DataFormat "JSON" -ConsumerGroup 'Default' -TableName "Events" -MappingRuleName "NewEventsMapping" .Example $database = Get-AzKustoDatabase -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" Invoke-AzKustoDataConnectionValidation -InputObject $database -DataConnectionName "myeventhubdc" -Location "East US" -Kind "EventHub" -EventHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.EventHub/namespaces/myeventhubns/eventhubs/myeventhub" -DataFormat "JSON" -ConsumerGroup 'Default' -Compression "None" -TableName "Events" -MappingRuleName "NewEventsMapping" .Example $database = Get-AzKustoDatabase -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" Invoke-AzKustoDataConnectionValidation -InputObject $database -DataConnectionName "myeventgriddc" -Location "East US" -Kind "EventGrid" -EventHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.EventHub/namespaces/myeventhubns/eventhubs/myeventhub" -StorageAccountResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.Storage/storageAccounts/mystorage" -DataFormat "JSON" -ConsumerGroup 'Default' -TableName "Events" -MappingRuleName "NewEventsMapping" .Example $database = Get-AzKustoDatabase -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" Invoke-AzKustoDataConnectionValidation -InputObject $database -DataConnectionName "myiothubdc" -Location "East US" -Kind "IotHub" -IotHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.Devices/IotHubs/myiothub" -SharedAccessPolicyName "myiothubpolicy" -DataFormat "JSON" -ConsumerGroup 'Default' -TableName "Events" -MappingRuleName "NewEventsMapping" .Inputs Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDataConnectionValidation .Inputs Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.IKustoIdentity .Outputs Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDataConnectionValidationResult .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <IKustoIdentity>: Identity Parameter [AttachedDatabaseConfigurationName <String>]: The name of the attached database configuration. [ClusterName <String>]: The name of the Kusto cluster. [DataConnectionName <String>]: The name of the data connection. [DatabaseName <String>]: The name of the database in the Kusto cluster. [Id <String>]: Resource identity path [Location <String>]: The name of Azure region. [ManagedPrivateEndpointName <String>]: The name of the managed private endpoint. [OperationId <String>]: The ID of an ongoing async operation. [PrincipalAssignmentName <String>]: The name of the Kusto principalAssignment. [PrivateEndpointConnectionName <String>]: The name of the private endpoint connection. [PrivateLinkResourceName <String>]: The name of the private link resource. [ResourceGroupName <String>]: The name of the resource group. The name is case insensitive. [SandboxCustomImageName <String>]: The name of the sandbox custom image. [ScriptName <String>]: The name of the Kusto database script. [SubscriptionId <String>]: The ID of the target subscription. PARAMETER <IDataConnectionValidation>: Class representing an data connection validation. [DataConnectionName <String>]: The name of the data connection. [Kind <DataConnectionKind?>]: Kind of the endpoint for the data connection [Location <String>]: Resource location. .Link https://learn.microsoft.com/powershell/module/az.kusto/invoke-azkustodataconnectionvalidation #> function Invoke-AzKustoDataConnectionValidation { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDataConnectionValidationResult])] [CmdletBinding(DefaultParameterSetName='DataExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='Data', Mandatory)] [Parameter(ParameterSetName='DataExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the Kusto cluster. ${ClusterName}, [Parameter(ParameterSetName='Data', Mandatory)] [Parameter(ParameterSetName='DataExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the database in the Kusto cluster. ${DatabaseName}, [Parameter(ParameterSetName='Data', Mandatory)] [Parameter(ParameterSetName='DataExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='Data')] [Parameter(ParameterSetName='DataExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName='DataViaIdentity', Mandatory, ValueFromPipeline)] [Parameter(ParameterSetName='DataViaIdentityExpanded', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.IKustoIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='Data', Mandatory, ValueFromPipeline)] [Parameter(ParameterSetName='DataViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDataConnectionValidation] # Class representing an data connection validation. # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='DataExpanded')] [Parameter(ParameterSetName='DataViaIdentityExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # The name of the data connection. ${DataConnectionName}, [Parameter(ParameterSetName='DataExpanded')] [Parameter(ParameterSetName='DataViaIdentityExpanded')] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.DataConnectionKind])] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.DataConnectionKind] # Kind of the endpoint for the data connection ${Kind}, [Parameter(ParameterSetName='DataExpanded')] [Parameter(ParameterSetName='DataViaIdentityExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # Resource location. ${Location}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Data = 'Az.Kusto.private\Invoke-AzKustoDataConnectionValidation_Data'; DataExpanded = 'Az.Kusto.private\Invoke-AzKustoDataConnectionValidation_DataExpanded'; DataViaIdentity = 'Az.Kusto.private\Invoke-AzKustoDataConnectionValidation_DataViaIdentity'; DataViaIdentityExpanded = 'Az.Kusto.private\Invoke-AzKustoDataConnectionValidation_DataViaIdentityExpanded'; } if (('Data', 'DataExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) { $testPlayback = $false $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } if ($testPlayback) { $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') } else { $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id } } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } <# .Synopsis Creates or updates a database. .Description Creates or updates a database. .Example New-AzKustoDatabase -ResourceGroupName testrg -ClusterName testnewkustocluster -Name mykustodatabase -Kind ReadWrite -Location 'East US' .Inputs Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDatabase .Outputs Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDatabase .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. PARAMETER <IDatabase>: Class representing a Kusto database. Kind <Kind>: Kind of the database [Location <String>]: Resource location. .Link https://learn.microsoft.com/powershell/module/az.kusto/new-azkustodatabase #> function New-AzKustoDatabase { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDatabase])] [CmdletBinding(DefaultParameterSetName='CreateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the Kusto cluster. ${ClusterName}, [Parameter(Mandatory)] [Alias('DatabaseName')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the database in the Kusto cluster. ${Name}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter()] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.CallerRole])] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Query')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.CallerRole] # By default, any user who run operation on a database become an Admin on it. # This property allows the caller to exclude the caller from Admins list. ${CallerRole}, [Parameter(ParameterSetName='Create', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDatabase] # Class representing a Kusto database. # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='CreateExpanded', Mandatory)] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.Kind])] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.Kind] # Kind of the database ${Kind}, [Parameter(ParameterSetName='CreateExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # Resource location. ${Location}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Create = 'Az.Kusto.private\New-AzKustoDatabase_Create'; CreateExpanded = 'Az.Kusto.private\New-AzKustoDatabase_CreateExpanded'; } if (('Create', 'CreateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) { $testPlayback = $false $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } if ($testPlayback) { $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') } else { $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id } } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } <# .Synopsis Creates or updates a data connection. .Description Creates or updates a data connection. .Example New-AzKustoDataConnection -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" -DataConnectionName "myeventhubdc" -Location "East US" -Kind "EventHub" -EventHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.EventHub/namespaces/myeventhubns/eventhubs/myeventhub" -DataFormat "JSON" -ConsumerGroup '$Default' -Compression "None" -TableName "Events" -MappingRuleName "EventsMapping" .Example New-AzKustoDataConnection -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" -DataConnectionName "myeventgriddc" -Location "East US" -Kind "EventGrid" -EventHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.EventHub/namespaces/myeventhubns/eventhubs/myeventhub" -StorageAccountResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.Storage/storageAccounts/mystorage" -DataFormat "JSON" -ConsumerGroup '$Default' -TableName "Events" -MappingRuleName "EventsMapping" .Example New-AzKustoDataConnection -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" -DataConnectionName "myiothubdc" -Location "East US" -Kind "IotHub" -IotHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.Devices/IotHubs/myiothub" -SharedAccessPolicyName "myiothubpolicy" -DataFormat "JSON" -ConsumerGroup '$Default' -TableName "Events" -MappingRuleName "EventsMapping" .Inputs Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDataConnection .Outputs Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDataConnection .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. PARAMETER <IDataConnection>: Class representing an data connection. Kind <DataConnectionKind>: Kind of the endpoint for the data connection [Location <String>]: Resource location. .Link https://learn.microsoft.com/powershell/module/az.kusto/new-azkustodataconnection #> function New-AzKustoDataConnection { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDataConnection])] [CmdletBinding(DefaultParameterSetName='CreateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the Kusto cluster. ${ClusterName}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the database in the Kusto cluster. ${DatabaseName}, [Parameter(Mandatory)] [Alias('DataConnectionName')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the data connection. ${Name}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName='Create', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDataConnection] # Class representing an data connection. # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='CreateExpanded', Mandatory)] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.DataConnectionKind])] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.DataConnectionKind] # Kind of the endpoint for the data connection ${Kind}, [Parameter(ParameterSetName='CreateExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # Resource location. ${Location}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Create = 'Az.Kusto.private\New-AzKustoDataConnection_Create'; CreateExpanded = 'Az.Kusto.private\New-AzKustoDataConnection_CreateExpanded'; } if (('Create', 'CreateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) { $testPlayback = $false $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } if ($testPlayback) { $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') } else { $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id } } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } <# .Synopsis Updates a database. .Description Updates a database. .Example $2ds = New-TimeSpan -Days 2 $4ds = New-TimeSpan -Days 4 Update-AzKustoDatabase -ResourceGroupName testrg -ClusterName testnewkustocluster -Name mykustodatabase -Kind ReadWrite -SoftDeletePeriod $4ds -HotCachePeriod $2ds -Location 'East US' .Example $database = Get-AzKustoDatabase -ResourceGroupName testrg -ClusterName testnewkustocluster -Name mykustodatabase $2ds = New-TimeSpan -Days 2 $4ds = New-TimeSpan -Days 4 Update-AzKustoDatabase -InputObject $database -Kind ReadWrite -SoftDeletePeriod $4ds -HotCachePeriod $2ds -Location 'East US' .Example $2ds = New-TimeSpan -Days 2 Update-AzKustoDatabase -ResourceGroupName testrg -ClusterName myfollowercluster -Name mykustodatabase -Kind ReadOnlyFollowing -HotCachePeriod $2ds -Location 'East US' .Example $database = Get-AzKustoDatabase -ResourceGroupName testrg -ClusterName myfollowercluster -Name mykustodatabase $2ds = New-TimeSpan -Days 2 Update-AzKustoDatabase -InputObject $database -Kind ReadOnlyFollowing -HotCachePeriod $2ds -Location 'East US' .Inputs Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDatabase .Inputs Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.IKustoIdentity .Outputs Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDatabase .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <IKustoIdentity>: Identity Parameter [AttachedDatabaseConfigurationName <String>]: The name of the attached database configuration. [ClusterName <String>]: The name of the Kusto cluster. [DataConnectionName <String>]: The name of the data connection. [DatabaseName <String>]: The name of the database in the Kusto cluster. [Id <String>]: Resource identity path [Location <String>]: The name of Azure region. [ManagedPrivateEndpointName <String>]: The name of the managed private endpoint. [OperationId <String>]: The ID of an ongoing async operation. [PrincipalAssignmentName <String>]: The name of the Kusto principalAssignment. [PrivateEndpointConnectionName <String>]: The name of the private endpoint connection. [PrivateLinkResourceName <String>]: The name of the private link resource. [ResourceGroupName <String>]: The name of the resource group. The name is case insensitive. [SandboxCustomImageName <String>]: The name of the sandbox custom image. [ScriptName <String>]: The name of the Kusto database script. [SubscriptionId <String>]: The ID of the target subscription. PARAMETER <IDatabase>: Class representing a Kusto database. Kind <Kind>: Kind of the database [Location <String>]: Resource location. .Link https://learn.microsoft.com/powershell/module/az.kusto/update-azkustodatabase #> function Update-AzKustoDatabase { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDatabase])] [CmdletBinding(DefaultParameterSetName='UpdateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='Update', Mandatory)] [Parameter(ParameterSetName='UpdateExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the Kusto cluster. ${ClusterName}, [Parameter(ParameterSetName='Update', Mandatory)] [Parameter(ParameterSetName='UpdateExpanded', Mandatory)] [Alias('DatabaseName')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the database in the Kusto cluster. ${Name}, [Parameter(ParameterSetName='Update', Mandatory)] [Parameter(ParameterSetName='UpdateExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='Update')] [Parameter(ParameterSetName='UpdateExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName='UpdateViaIdentity', Mandatory, ValueFromPipeline)] [Parameter(ParameterSetName='UpdateViaIdentityExpanded', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.IKustoIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.CallerRole])] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Query')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.CallerRole] # By default, any user who run operation on a database become an Admin on it. # This property allows the caller to exclude the caller from Admins list. ${CallerRole}, [Parameter(ParameterSetName='Update', Mandatory, ValueFromPipeline)] [Parameter(ParameterSetName='UpdateViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDatabase] # Class representing a Kusto database. # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='UpdateExpanded', Mandatory)] [Parameter(ParameterSetName='UpdateViaIdentityExpanded', Mandatory)] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.Kind])] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.Kind] # Kind of the database ${Kind}, [Parameter(ParameterSetName='UpdateExpanded')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # Resource location. ${Location}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Update = 'Az.Kusto.private\Update-AzKustoDatabase_Update'; UpdateExpanded = 'Az.Kusto.private\Update-AzKustoDatabase_UpdateExpanded'; UpdateViaIdentity = 'Az.Kusto.private\Update-AzKustoDatabase_UpdateViaIdentity'; UpdateViaIdentityExpanded = 'Az.Kusto.private\Update-AzKustoDatabase_UpdateViaIdentityExpanded'; } if (('Update', 'UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) { $testPlayback = $false $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } if ($testPlayback) { $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') } else { $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id } } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } <# .Synopsis Updates a data connection. .Description Updates a data connection. .Example Update-AzKustoDataConnection -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" -DataConnectionName "myeventhubdc" -Location "East US" -Kind "EventHub" -EventHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.EventHub/namespaces/myeventhubns/eventhubs/myeventhub" -DataFormat "JSON" -ConsumerGroup '$Default' -Compression "None" -TableName "Events" -MappingRuleName "NewEventsMapping" .Example Update-AzKustoDataConnection -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" -DataConnectionName "myeventgriddc" -Location "East US" -Kind "EventGrid" -EventHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.EventHub/namespaces/myeventhubns/eventhubs/myeventhub" -StorageAccountResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.Storage/storageAccounts/mystorage" -DataFormat "JSON" -ConsumerGroup '$Default' -TableName "Events" -MappingRuleName "NewEventsMapping" .Example Update-AzKustoDataConnection -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" -DataConnectionName "myiothubdc" -Location "East US" -Kind "IotHub" -IotHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.Devices/IotHubs/myiothub" -SharedAccessPolicyName "myiothubpolicy" -DataFormat "JSON" -ConsumerGroup '$Default' -TableName "Events" -MappingRuleName "NewEventsMapping" .Example $dataConnection = Get-AzKustoDataConnection -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" -DataConnectionName "myeventhubdc" Update-AzKustoDataConnection -InputObject $dataConnection -Location "East US" -Kind "EventHub" -EventHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.EventHub/namespaces/myeventhubns/eventhubs/myeventhub" -DataFormat "JSON" -ConsumerGroup '$Default' -Compression "None" -TableName "Events" -MappingRuleName "NewEventsMapping" .Example $dataConnection = Get-AzKustoDataConnection -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" -DataConnectionName "myeventgriddc" Update-AzKustoDataConnection -InputObject $dataConnection -Location "East US" -Kind "EventGrid" -EventHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.EventHub/namespaces/myeventhubns/eventhubs/myeventhub" -StorageAccountResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.Storage/storageAccounts/mystorage" -DataFormat "JSON" -ConsumerGroup '$Default' -TableName "Events" -MappingRuleName "NewEventsMapping" .Example $dataConnection = Get-AzKustoDataConnection -ResourceGroupName "testrg" -ClusterName "testnewkustocluster" -DatabaseName "mykustodatabase" -DataConnectionName "myiothubdc" Update-AzKustoDataConnection -InputObject $dataConnection -Location "East US" -Kind "IotHub" -IotHubResourceId "/subscriptions/$subscriptionId/resourcegroups/testrg/providers/Microsoft.Devices/IotHubs/myiothub" -SharedAccessPolicyName "myiothubpolicy" -DataFormat "JSON" -ConsumerGroup '$Default' -TableName "Events" -MappingRuleName "NewEventsMapping" .Inputs Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDataConnection .Inputs Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.IKustoIdentity .Outputs Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDataConnection .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <IKustoIdentity>: Identity Parameter [AttachedDatabaseConfigurationName <String>]: The name of the attached database configuration. [ClusterName <String>]: The name of the Kusto cluster. [DataConnectionName <String>]: The name of the data connection. [DatabaseName <String>]: The name of the database in the Kusto cluster. [Id <String>]: Resource identity path [Location <String>]: The name of Azure region. [ManagedPrivateEndpointName <String>]: The name of the managed private endpoint. [OperationId <String>]: The ID of an ongoing async operation. [PrincipalAssignmentName <String>]: The name of the Kusto principalAssignment. [PrivateEndpointConnectionName <String>]: The name of the private endpoint connection. [PrivateLinkResourceName <String>]: The name of the private link resource. [ResourceGroupName <String>]: The name of the resource group. The name is case insensitive. [SandboxCustomImageName <String>]: The name of the sandbox custom image. [ScriptName <String>]: The name of the Kusto database script. [SubscriptionId <String>]: The ID of the target subscription. PARAMETER <IDataConnection>: Class representing an data connection. Kind <DataConnectionKind>: Kind of the endpoint for the data connection [Location <String>]: Resource location. .Link https://learn.microsoft.com/powershell/module/az.kusto/update-azkustodataconnection #> function Update-AzKustoDataConnection { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDataConnection])] [CmdletBinding(DefaultParameterSetName='UpdateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='Update', Mandatory)] [Parameter(ParameterSetName='UpdateExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the Kusto cluster. ${ClusterName}, [Parameter(ParameterSetName='Update', Mandatory)] [Parameter(ParameterSetName='UpdateExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the database in the Kusto cluster. ${DatabaseName}, [Parameter(ParameterSetName='Update', Mandatory)] [Parameter(ParameterSetName='UpdateExpanded', Mandatory)] [Alias('DataConnectionName')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the data connection. ${Name}, [Parameter(ParameterSetName='Update', Mandatory)] [Parameter(ParameterSetName='UpdateExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='Update')] [Parameter(ParameterSetName='UpdateExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName='UpdateViaIdentity', Mandatory, ValueFromPipeline)] [Parameter(ParameterSetName='UpdateViaIdentityExpanded', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.IKustoIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='Update', Mandatory, ValueFromPipeline)] [Parameter(ParameterSetName='UpdateViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDataConnection] # Class representing an data connection. # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='UpdateExpanded', Mandatory)] [Parameter(ParameterSetName='UpdateViaIdentityExpanded', Mandatory)] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.DataConnectionKind])] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.DataConnectionKind] # Kind of the endpoint for the data connection ${Kind}, [Parameter(ParameterSetName='UpdateExpanded')] [Parameter(ParameterSetName='UpdateViaIdentityExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')] [System.String] # Resource location. ${Location}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Update = 'Az.Kusto.private\Update-AzKustoDataConnection_Update'; UpdateExpanded = 'Az.Kusto.private\Update-AzKustoDataConnection_UpdateExpanded'; UpdateViaIdentity = 'Az.Kusto.private\Update-AzKustoDataConnection_UpdateViaIdentity'; UpdateViaIdentityExpanded = 'Az.Kusto.private\Update-AzKustoDataConnection_UpdateViaIdentityExpanded'; } if (('Update', 'UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) { $testPlayback = $false $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } if ($testPlayback) { $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') } else { $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id } } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # SIG # Begin signature block # MIIn0QYJKoZIhvcNAQcCoIInwjCCJ74CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCFxDCJJe2hLA9t # c8wldenZVO536g3vWkxPEKlVn68xZKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPnN # JpnBgD++r0pZ2D/sdsdrl22S4/kzstK/LiuMR40aMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEALkrFiqU7CPFFYLZ+sEDKPlqm+4n2bwJcR6yS # tIJvqvFSe95Gd+4ICqwi4U6cPBuoYNwvfRN6zm8oRnl1R8fjiAXtlsG0zY3B6Wxo # 2sm3W/L1ylzpIx9EyHy1obDyErD6rZZe9zp/hSiD80CvmVDHSK7qT0EU1TrOsx9v # V0zZ/nGNGQ1O3Bx1Yp/3I9nTsLEl3YgoKLl3AzL7JBfO9ZJ8bFdcIHcAnL6gFVto # fp+XuP0V/HGdbzF3h6+XtO1H6lzD6AF8uoSwaXxxjIxY2qPWZbqdMHk6JUZZfj91 # c5gWwELJFwGLxuKRT0EOcKcWw3lrl6kSz4KE6dYMl648SIlXjaGCFywwghcoBgor # BgEEAYI3AwMBMYIXGDCCFxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCXHISmKozOAr7E3K0osFv25p0lMVZzn+Le # BhjNjAdRVAIGZiAgthRgGBMyMDI0MDQyMzEzMTUxOS4zMTJaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV # 8dzjIOsAAQAAAeIwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVj # tZhV+kFmb8cKQpg2mzisDlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC # 7jS03JkcrPsWi9WpVwsIckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJ # bsE3wMmpmJasPWpgF05zZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmU # Xs7ICxDJr5a39SSePAJRIyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwne # tSePg88EmRezr2T3HTFElneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfF # cS4XElf3GSERnlzJsK7s/ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4 # eQszYxq4c4HqPnUu4hT4aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdth # FCBepxfb6nbsp3fcZaPBfTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCW # ACoj78XUwYqy1HyYnStTme4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKv # NNsTVm4QbqphCyknrwByqorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3u # fASdPrgPhsQIRFkHZGuihL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQURIQOEdq+7QdslptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAORURDGrVRTbnulfsg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3 # ka76Yz0t/6lxuczI6w7tXq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwL # hP1PGC5tvXK0xYomU1nU+lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrX # a2daCOGnxuaD1IO+65E7qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0gan # hFzzHAnWjtNWneU11WQ6Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVl # UE3zIikoSed+8s61NDP+x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIo # ycVTvBQpv/drRJD68eo401mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iO # aKZ75vuQg7hCiBA5xIm5ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqv # E8Aq38QmKgTiBnWSS/uVPcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhS # gCIGJUZDA7336nQD8fn4y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv # 1ug7dS/Dfrcd1sn2E4gk4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhf # iB1d8pTohm+ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQy # NDE1MTcxMlowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgID # FQIB/zAHAgEAAgITGDAKAgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA # A4GBANIiA17LpM6vqyo+h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv # /pD1kqx4aZmxSYhfghQxG6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z # 6t1t+B5+UpZHn/ZqMCje0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEw # gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsA # AQAAAeIwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B # CRABBDAvBgkqhkiG9w0BCQQxIgQgSBzXNgYeclxIUJDoQPlJINkiAbNQ/SjPceyh # gEJRmmswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETO # DoL4d5LU6I/bjucIZkOJCI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwAhMzAAAB4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O # 6Yu7/zJ0dHmtmWF4o2meBeYsMA0GCSqGSIb3DQEBCwUABIICAJlVDKDrUFwgdKHw # eNtKs0x6OMYkot4sjXm+DwA/+4H64NFaPKpIswXYnvtyysfM4AEp4bIYuL+kZkH1 # ekWGinVXYur/bjKo7IXnocIO+ajvGCvwG5j/4Vfy9UEIWq7xql3KSd7amPXZi3Wj # +5rvwfnLWvu6EpBrBZON0wPKvu67ibK1sn8AWUj8b73ig5h4f6jOUymhO2UFBhdX # d9Z5X2n5vhx1lGYONBAs0SfYsCZWwyRfarIz6O6aKL/mvJfOFnx2S108ms6eI6qN # f6jRO2mN/cmODVRcq429r2vBtyuIYBbS6z7maFB5++LtQL7gzOvVNFkKn0OPmfs1 # 3h+0BauIvsXC7iIvHhfJXKjpQG6Qm5l3B1bbBGRRoq9VjXUEIBzuxl8vEmejIPhT # qBd/WyE2PuEzD8coc1hH8X/6GmnTKqY6EuP5GQ7DPiFu0JgJkZzxWqGScqU7Eko4 # ol04MsEZR3O+iuT6QEKm1ISB69kuUsqSYK9fPiiOm1CtMs45fH9ED9S4AJ/V08LV # zbJJ0PEXwnLIK9PfTjBGd3/3YOyYQx1Z1p6EaD/DhwduCHvMv1GW9UTHUPT0m63k # K65cBqbM90OGuSjtiBdZUVx/85taglKbwrxwehCLWGhYjdkVdDCiO3Gzc2Vdj7pk # d2ypfqXNCUlT74xhiSJQ6g3N03c4 # SIG # End signature block
combined_dataset/train/non-malicious/3614.ps1
3614.ps1
function Test-GetAzureRmLogProfile { try { $actual = Get-AzLogProfile -Name default Assert-AreEqual /subscriptions/a93fb07c-6c93-40be-bf3b-4f0deba10f4b/providers/microsoft.insights/logprofiles/default $actual.Id "Resource Ids not equal" Assert-AreEqual default $actual.Name "Names not equal" Assert-AreEqual "/subscriptions/a93fb07c-6c93-40be-bf3b-4f0deba10f4b/resourceGroups/insights-integration/providers/Microsoft.Storage/storageAccounts/insightsintegration7777" $actual.StorageAccountId "Storage Account Ids not equal" Assert-Null $actual.ServiceBusRuleId "ServiceBus rule Id not null" Assert-AreEqual 1 $actual.Locations.Count "Count not 1" Assert-AreEqual global $actual.Locations "Location not global" Assert-AreEqual 3 $actual.Categories.Count "Categories count not 3" Assert-AreEqual Delete $actual.Categories[0] "Category[0] not Delete" Assert-AreEqual Write $actual.Categories[1] "Category[1] not Write" Assert-AreEqual Action $actual.Categories[2] "Category[2] not Action" Assert-False { $actual.RetentionPolicy.Enabled } "RetentionPolicy not false" Assert-AreEqual 0 $actual.RetentionPolicy.Days "Retention Days not 0" } finally { } } function Test-AddAzureRmLogProfile { try { $actual = Add-AzLogProfile -Name default -StorageAccountId /subscriptions/1a66ce04-b633-4a0b-b2bc-a912ec8986a6/resourceGroups/insights-integration/providers/Microsoft.Storage/storageAccounts/insightsintegration7777 -Location global -Category Delete,Write,Action Assert-AreEqual $true $actual } finally { } } function Test-AddAzureRmLogProfileWithRetention { try { $actual = Add-AzLogProfile -Name default -StorageAccountId /subscriptions/1a66ce04-b633-4a0b-b2bc-a912ec8986a6/resourceGroups/insights-integration/providers/Microsoft.Storage/storageAccounts/insightsintegration7777 -Location global -Category Delete,Write,Action -RetentionInDays 90 Assert-AreEqual $true $actual } finally { } }
combined_dataset/train/non-malicious/sample_20_41.ps1
sample_20_41.ps1
# # Module manifest for module 'OCI.PSModules.Datalabelingservice' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datalabelingservice.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '600a044a-632a-42d0-b1ab-94f26e2f3791' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datalabelingservice Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datalabelingservice.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatalabelingserviceDatasetLabels', 'Get-OCIDatalabelingserviceAnnotationFormatsList', 'Get-OCIDatalabelingserviceDataset', 'Get-OCIDatalabelingserviceDatasetsList', 'Get-OCIDatalabelingserviceWorkRequest', 'Get-OCIDatalabelingserviceWorkRequestErrorsList', 'Get-OCIDatalabelingserviceWorkRequestLogsList', 'Get-OCIDatalabelingserviceWorkRequestsList', 'Import-OCIDatalabelingservicePreAnnotatedData', 'Invoke-OCIDatalabelingserviceSnapshotDataset', 'Move-OCIDatalabelingserviceDatasetCompartment', 'New-OCIDatalabelingserviceDataset', 'New-OCIDatalabelingserviceDatasetRecords', 'Remove-OCIDatalabelingserviceDataset', 'Remove-OCIDatalabelingserviceDatasetLabels', 'Rename-OCIDatalabelingserviceDatasetLabels', 'Update-OCIDatalabelingserviceDataset' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datalabelingservice' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/WindowsInstallPoint.ps1
WindowsInstallPoint.ps1
function Initialize-WindowsInstallPoint { <# .SYNOPSIS Initializes a drive to become a Windows OS install point. .DESCRIPTION The Initialize-WindowsInstallPoint function uses the "diskpart" utility to wipe, partition, and format a local or removable drive. The "bootsect" tool processes the bootmgr allowing the drive to become a bootable device from which Windows can be installed. Once the drive is initialized, copy the entire contents of the Windows install media to the drive. Windows Vista, 7, Server 2008, and Server 2008 R2 are supported. .PARAMETER Drive Specifies the drive to initialize as a Windows install point. <DriveLetter:> .PARAMETER BootsectPath The full file path to the "bootsect.exe" tool. For Windows versions 6.x, it's located on the installation media in the "boot" folder. .PARAMETER DiskpartPath The full file path to the "diskpart.exe" tool. Default parameter value: $env:SystemRoot\\System32\\diskpart.exe .EXAMPLE Initialize-WindowsInstallPoint X: D:\\boot\\bootsect.exe Initializes drive X: using the bootsect.exe tool located in the boot folder of drive D: .INPUTS System.String .OUTPUTS None .NOTES Name: Initialize-WindowsInstallPoint Author: Rich Kusak (rkusak@cbcag.edu) Created: 2009-10-24 Last Edit: 2011-04-07 18:48 Version: 1.7.0.0 #Requires Version 2.0 .LINK bootsect.exe .LINK diskpart.exe #> [CmdletBinding(ConfirmImpact='High', SupportsShouldProcess=$true)] param ( [Parameter(Position=0, Mandatory=$true, ValueFromPipelineByPropertyName=$true, HelpMessage='The drive qualifier of the device to become a Windows install point.' )] [ValidateScript({ switch ($_) { $env:SystemDrive {throw 'This operation cannot be performed on the system drive.'} {$_ -match '^[a-z]:$'} {$true} default {throw "The argument '$_' is not a valid drive designation. Supply an argument that matches '<DriveLetter>:' and try the command again."} } })] [string]$Drive, [Parameter(Position=1, Mandatory=$true, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage='The full path to the bootsect.exe tool.' )] [Alias('FullName')] [ValidateScript({ if (Test-Path $_ -Include '*bootsect.exe') {$true} else { throw "The argument '$_' is not a real path to the bootsect.exe tool." } })] [string]$BootsectPath, [Parameter(ValueFromPipelineByPropertyName=$true, HelpMessage='The full path to the diskpart.exe tool.' )] [ValidateScript({ if (Test-Path $_ -Include '*diskpart.exe') {$true} else { throw "The arguments '$_' is not a real path to the diskpart.exe tool." } })] [string]$DiskpartPath = "$env:SystemRoot\\System32\\diskpart.exe" ) begin { function Test-Elevation { $admin = [System.Security.Principal.WindowsBuiltInRole]::Administrator $identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $principal = New-Object System.Security.Principal.WindowsPrincipal($identity) $principal.IsInRole($admin) } # Test that PowerShell is running as an administrator if (-not (Test-Elevation)) { throw 'Administrator privileges are required. PowerShell is not running as an administrator.' } $dpExitCodes = @{ 0 = 'No error occurred. The entire script ran without failure.' 1 = 'A fatal exception occurred. There may be a serious problem.' 2 = 'The arguments specified on a Diskpart command line were incorrect.' 3 = 'Diskpart was unable to open the specified script or output file.' 4 = 'One of the services Diskpart uses returned a failure.' 5 = 'A command syntax error occurred. The script failed because an object was improperly selected or was invalid for use with that command.' } # Temporary files for the diskpart script and redirect standard output $dpScript = [System.IO.Path]::GetTempFileName() $rso = [System.IO.Path]::GetTempFileName() # Set the initial instance of the variable used to control the flow of $psCmdlet $psc = $null } # end begin process { # Capitalize drive letter for display $Drive = $Drive.ToUpper() # Detrimine if the drive meets the requirements to become a Windows install point Write-Debug 'Getting WMI object Win32_LogicalDisk' $logicalDisk = Get-WmiObject Win32_LogicalDisk -Filter "DeviceID = '$Drive' " if ($logicalDisk.DriveType -notmatch '^(2|3)$') { return Write-Error "Drive '$Drive' is not a local or removable drive." -TargetObject $Drive } elseif ($logicalDisk.Size -lt 3.5GB) { # Different Windows editions vary in size but a drive 3.5GB or greater should accomidate all editions Write-Warning "Drive '$Drive' may not be large enough for Windows installation files." } if ($psc -eq $null) {$psc = $psCmdlet} if ($psc.ShouldProcess($Drive, "Initialize Windows install point. Any existing data will be DESTROYED")) { Write-Progress -Activity 'Initialize Windows Install Point' -Status "Drive $Drive" -CurrentOperation 'Preparing disk volume' -PercentComplete 0 # Diskpart script content @" Select Volume $($Drive[0]) Clean Create Partition Primary Select Partition 1 Active Format Quick FS=NTFS Label=WindowsInstallPoint Assign Letter $Drive Exit "@ | Out-File $dpScript -Encoding ASCII -Force Write-Debug 'Starting process diskpart.exe' # Using Start-Process allows the exit code to be processed from either the console or ISE. $diskpart = Start-Process $DiskpartPath "/s $dpScript" -NoNewWindow -Wait -PassThru -RedirectStandardOutput $rso 1..45 | ForEach { Write-Progress -Activity 'Initialize Windows Install Point' -Status "Drive $Drive" -CurrentOperation 'Preparing disk volume' -PercentComplete $_ Sleep -Milliseconds 20 } # Removes empty lines from the original diskpart.exe output and sends it to the verbose stream Get-Content $rso | Select-String '.' | ForEach {Write-Verbose $_} # Diskpart error handling if ($diskpart.ExitCode -eq 0) { Write-Verbose "Drive '$Drive' has been successfully processed by the diskpart.exe tool." } elseif ($diskpart.ExitCode -gt 0) { return Write-Error $dpExitCodes.($diskpart.ExitCode) } else { return Write-Error 'An unknown error occured.' } Write-Debug 'Starting process bootsect.exe' # Using Start-Process allows the exit code to be processed from either the console or ISE. $bootsect = Start-Process $BootsectPath "/NT60 $Drive" -NoNewWindow -Wait -PassThru -RedirectStandardOutput $rso 46..90 | ForEach { Write-Progress -Activity 'Initialize Windows Install Point' -Status "Drive $Drive" -CurrentOperation 'Setting boot code' -PercentComplete $_ Sleep -Milliseconds 20 } # Removes empty lines from the original bootsect.exe output and sends it to the verbose stream Get-Content $rso | Select-String '.' | ForEach {Write-Verbose $_} # Bootsect error handling if ($bootsect.ExitCode -eq 0) { Write-Verbose "Drive '$Drive' has been successfully processed by the bootsect.exe tool." Write-Progress -Activity 'Initialize Windows Install Point' -Status "Drive $Drive" -CurrentOperation 'Complete' -PercentComplete 100 Sleep -Seconds 1 } else { return Write-Error "$bootsect" } } # end ShouldProcess Write-Verbose "Drive '$Drive' has been successfully initialized as a Windows install point." } # end process end { # Cleanup temporary files Remove-Item $dpScript, $rso -Force -WhatIf:$false } } # end function Initialize-WindowsInstallPoint
combined_dataset/train/non-malicious/1845.ps1
1845.ps1
return $cmdletName = "Export-Counter" . "$PSScriptRoot/CounterTestHelperFunctions.ps1" $rootFilename = "exportedCounters" $filePath = $null $counterNames = @( (TranslateCounterPath "\Memory\Available Bytes") (TranslateCounterPath "\Processor(*)\% Processor Time") (TranslateCounterPath "\Processor(_Total)\% Processor Time") (TranslateCounterPath "\PhysicalDisk(_Total)\Current Disk Queue Length") (TranslateCounterPath "\PhysicalDisk(_Total)\Disk Bytes/sec") (TranslateCounterPath "\PhysicalDisk(_Total)\Disk Read Bytes/sec") ) $counterValues = $null function CheckExportResults { Test-Path $filePath | Should -BeTrue $importedCounterValues = Import-Counter $filePath CompareCounterSets $counterValues $importedCounterValues } function RunTest($testCase) { It "$($testCase.Name)" -Skip:$(SkipCounterTests) { $getCounterParams = "" if ($testCase.ContainsKey("GetCounterParams")) { $getCounterParams = $testCase.GetCounterParams } $counterValues = &([ScriptBlock]::Create("Get-Counter -Counter `$counterNames $getCounterParams")) $filePath = "" $pathParam = "" $formatParam = "" if ($testCase.ContainsKey("Path")) { $filePath = $testCase.Path } else { if ($testCase.ContainsKey("FileFormat")) { $formatParam = "-FileFormat $($testCase.FileFormat)" $filePath = Join-Path $script:outputDirectory "$rootFilename.$($testCase.FileFormat)" } else { $filePath = Join-Path $script:outputDirectory "$rootFilename.blg" } } if ($testCase.NoDashPath) { $pathParam = $filePath } else { $pathParam = "-Path $filePath" } $cmd = "$cmdletName $pathParam $formatParam -InputObject `$counterValues $($testCase.Parameters) -ErrorAction Stop" if ($testCase.CreateFileFirst) { if (-not (Test-Path $filePath)) { New-Item $filePath -ItemType file } } try { if ($testCase.ContainsKey("Script")) { $sb = [ScriptBlock]::Create($cmd) &$sb &$testCase.Script } else { $sb = [ScriptBlock]::Create($cmd) { &$sb } | Should -Throw -ErrorId $testCase.ExpectedErrorId } } finally { if ($filePath) { Remove-Item $filePath -ErrorAction SilentlyContinue } } } } Describe "CI tests for Export-Counter cmdlet" -Tags "CI" { BeforeAll { $script:outputDirectory = $testDrive } $testCases = @( @{ Name = "Can export BLG format" FileFormat = "blg" GetCounterParams = "-MaxSamples 5" Script = { CheckExportResults } } @{ Name = "Exports BLG format by default" GetCounterParams = "-MaxSamples 5" Script = { CheckExportResults } } ) foreach ($testCase in $testCases) { RunTest $testCase } } Describe "Feature tests for Export-Counter cmdlet" -Tags "Feature" { BeforeAll { $script:outputDirectory = $testDrive } Context "Validate incorrect parameter usage" { $testCases = @( @{ Name = "Fails when given invalid path" Path = "c:\DAD288C0-72F8-47D3-8C54-C69481B528DF\counterExport.blg" ExpectedErrorId = "FileCreateFailed,Microsoft.PowerShell.Commands.ExportCounterCommand" } @{ Name = "Fails when given null path" Path = "`$null" ExpectedErrorId = "ParameterArgumentValidationErrorNullNotAllowed,Microsoft.PowerShell.Commands.ExportCounterCommand" } @{ Name = "Fails when -Path specified but no path given" Path = "" ExpectedErrorId = "MissingArgument,Microsoft.PowerShell.Commands.ExportCounterCommand" } @{ Name = "Fails when given -Circular without -MaxSize" Parameters = "-Circular" ExpectedErrorId = "CounterCircularNoMaxSize,Microsoft.PowerShell.Commands.ExportCounterCommand" } @{ Name = "Fails when given -Circular with zero -MaxSize" Parameters = "-Circular -MaxSize 0" ExpectedErrorId = "CounterCircularNoMaxSize,Microsoft.PowerShell.Commands.ExportCounterCommand" } @{ Name = "Fails when -MaxSize < zero" Parameters = "-MaxSize -2" ExpectedErrorId = "CannotConvertArgumentNoMessage,Microsoft.PowerShell.Commands.ExportCounterCommand" } ) foreach ($testCase in $testCases) { RunTest $testCase } } Context "Export tests" { $testCases = @( @{ Name = "Fails when output file exists" CreateFileFirst = $true ExpectedErrorId = "CounterFileExists,Microsoft.PowerShell.Commands.ExportCounterCommand" } @{ Name = "Can force overwriting existing file" Parameters = "-Force" Script = { Test-Path $filePath | Should -BeTrue } } @{ Name = "Can export BLG format" FileFormat = "blg" GetCounterParams = "-MaxSamples 5" Script = { CheckExportResults } } @{ Name = "Exports BLG format by default" GetCounterParams = "-MaxSamples 5" Script = { CheckExportResults } } @{ Name = "Can export CSV format" FileFormat = "csv" GetCounterParams = "-MaxSamples 2" Script = { CheckExportResults } } @{ Name = "Can export TSV format" FileFormat = "tsv" GetCounterParams = "-MaxSamples 5" Script = { CheckExportResults } } ) foreach ($testCase in $testCases) { RunTest $testCase } } }
combined_dataset/train/non-malicious/2971.ps1
2971.ps1
. "$PSScriptRoot/tools.ps1" $dotnetArguments = @{ Channel = 'Current' Version = 'latest' NoSudo = $false } Install-Dotnet @dotnetArguments $Env:PATH += "$([IO.Path]::PathSeparator)$Env:HOME/.dotnet" dotnet build -version -nologo
combined_dataset/train/non-malicious/3070.ps1
3070.ps1
$here = Split-Path -Parent $MyInvocation.MyCommand.Path . "$here\Add-Numbers.ps1" Describe -Tags "Example" "Add-Numbers" { It "adds positive numbers" { Add-Numbers 2 3 | Should -Be 5 } It "adds negative numbers" { Add-Numbers (-2) (-2) | Should -Be (-4) } It "adds one negative number to positive number" { Add-Numbers (-2) 2 | Should -Be 0 } It "concatenates strings if given strings" { Add-Numbers two three | Should -Be "twothree" } It "should not be 0" { Add-Numbers 2 3 | Should -Not -Be 0 } }
combined_dataset/train/non-malicious/sample_1_23.ps1
sample_1_23.ps1
# TS_AnonymousAuthentication_Enabled.ps1 # Description: Determine whether anonymous authentication is enabled on the CRM web site. # Created: 1/10/2012 # Author: Jonathan Randall #************************************************************************************************* # Date: 11-12-2012 # Description: Updated script to work with Windows Server 2012 #************************************************************************************************* # Last Modified: 2023-02-18 by #we# #region Functions function GetIISVersion(){ trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat;continue } if (Test-Path HKLM:\SYSTEM\CurrentControlSet\Services\W3SVC\Parameters){ $parameters = Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Services\W3SVC\Parameters $majorVersion = $parameters.MajorVersion return $majorVersion; }else{ return $null } } function CheckAuthFlag([int]$authflag){ trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat;continue } switch($authflag){ {($_ -eq 1) -or ($_ -eq 3) -or ($_ -eq 5) -or ($_ -eq 7) -or ($_ -eq 11) -or ($_ -eq 13) -or ($_ -eq 15) -or ($_ -eq 17)} {return $true;break} default {return $false;break} } } #endregion Functions . ./utils_MBS.ps1 trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat;continue } Import-LocalizedData -BindingVariable LocalizedMessages Write-DiagProgress -Activity $LocalizedMessages.PROGRESSBAR_ID_CRM_ANONYMOUSAUTH_ENABLED -Status $LocalizedMessages.PROGRESSBAR_ID_CRM_ANONYMOUSAUTH_ENABLEDDesc "--> Entered TS_AnonymousAuthentication_Enabled.ps1" | WriteTo-StdOut $RootCauseDetected = $false $iis_version = GetIISVersion if (Test-Path HKLM:\Software\Microsoft\MSCRM){ #Need to check the server to make sure CRM is installed. $MSCRMKey = Get-Item HKLM:\Software\Microsoft\MSCRM if ($MSCRMKey -ne $null){ if ($iis_version -ne 7 -and $iis_version -ne 8){ $sites = ([adsi]"IIS://localhost/W3SVC").psbase.children foreach ($objSite in $sites){ if ($objSite.Path.Substring(16) -eq $MSCRMKey.GetValue("website").Substring(4)){ $website = $objSite.ServerComment.Value $site_name=$MSCRMKey.GetValue("website").Substring(4) + "/ROOT" #$crm_site = Get-CimInstance -Class "IIsWebVirtualDirSetting" -Namespace "root\MicrosoftIISv2" -Filter "Name='$site_name'" #RBJC_To_DO #if (-not (CheckAuthFlag $crm_site.AuthFlags)){ # $RootCauseDetected = $true # Write-GenericMessage -RootCauseID "RC_AnonymousAuth_Enabled" -Verbosity "Error" -SolutionTitle "Anonymous Authentication is Disabled on Microsoft CRM Web Site" -ProcessName "W3WP.exe" #} } } } else{ #Rule is being run against an IIS 7.x server [System.Reflection.Assembly]::LoadWithPartialName("Microsoft.Web.Administration") | Out-Null $iis = new-object Microsoft.Web.Administration.ServerManager foreach ($site in $iis.Sites){ if ($site.Name.StartsWith("Microsoft Dynamics CRM") -and $site.Applications[0].ApplicationPoolName -eq "CRMAppPool"){ $iisHost = $iis.GetApplicationHostConfiguration() $iisWeb = $iis.GetWebConfiguration($site.Name) $anon_auth = $iisHost.GetSection("system.webServer/security/authentication/anonymousAuthentication",$site.Name).GetAttributeValue("enabled") if (-not $anon_auth){ $RootCauseDetected = $true Write-GenericMessage -RootCauseID "RC_AnonymousAuth_Enabled" -Verbosity "Error" -SolutionTitle "Anonymous Authentication is Disabled on Microsoft CRM Web Site" -ProcessName "W3WP.exe" } } } } } } if ($RootCauseDetected -eq $true){ Update-DiagRootCause -Id "RC_AnonymousAuth_Enabled" -Detected $true if ($Error.Count -gt 0) { ("ERROR=" + $Error) | WriteTo-StdOut } }else{ Update-DiagRootCause -Id "RC_AnonymousAuth_Enabled" -Detected $false } "<-- Exited TS_AnonymousAuthentication_Enabled.ps1" | WriteTo-StdOut # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAWVGQPhIJ9Hr3h # d4WWkZYPIykrYTVz6AsYyEjdvzMkmqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBxjGUgy8jF2/e+nj//dJj1r # f+rFQ5Khto1EWv59FlBVMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAQEcuXSl6mVQ7GWuzDFk6IyysEUoRk4XrCjatBZP/JNRHyI+synGnGqWA # fuU1FOwZlGTUiQqJbJhuFS/PWsG84PQr7k+jXy21qxmO/a3Zgij+dfU6WZgB6qqJ # +6NT40UCCfqbzhweJ4zwT5opqS7jWBt8jDHs2kNul59zQ58Oqb1m6pjHk5PPj9zd # E3bTfor7DVVeBJwLjie8GgIej364hdSK1hRiBVekV/icyh4WfqOse+3M8WbTBnVu # MtSHBtmz7fA8lO5rpAHsNtntlhSSkNk7tA8YA+HbY8v5k1EnnG3Xbc/lBhl5qlZW # nQYLkTpmocEQG0KownxUS8uzQge7N6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCVu8rsjyeU20dVf48fvcCqsvGEat3yrzE+RZ+rEeZ/tAIGZxp39n9a # GBMyMDI0MTAyODExNDA0MC45ODlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/ # Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1 # tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060 # akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq # dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0 # EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8 # /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79 # 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE # blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S # bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+ # wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul # IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC # pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn # HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6 # ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn # LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi # DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+ # uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb # n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe # GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B # 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv # KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9 # gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz # cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smTdjAiGA8yMDI0MTAyODA0Mzcx # MFoYDzIwMjQxMDI5MDQzNzEwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZN2 # AgEAMAoCAQACAgsfAgH/MAcCAQACAhSeMAoCBQDqyuT2AgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAACu8K1erSG3WA+KFwBfZzinNGLPeJwLYnFLBSgW0x8b # Vs9wv8pBHL2TK6Pe23xtA/0uCwDBh6P5fC2xQb1j36fFn4yH74aFvokpslhV4n1k # KIE8LqhplPRpGriSZ+s07DcVOeLDZ8jRV5RkN3/8myyj76R5HSgyZastSefkWLKh # dgv1pa1yD8l6NbtcI69W0Viwz4WdjgqLTwtASbKYSOWtSz0xycvyKPGMldl/P7yr # DnTw5N916Uubpcaa2OOV/GP1RGATQZoGg3+zPuKYYn2CEPlS/wpUPG/n2c5x80jT # 3Rlh8SXd7wZxaZ9KVgMTavWz6I0tYfwtNUTabE9ovWkxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB # 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCA3IQjA2hYgPZJkZY2uEsgQIXLdCi8qI0Hy4t9CRwNo # /zCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE # X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgfk7yL/Fg+qwMxB83yRNFNNOG # Ba29IheaFT2QvafHnF0wDQYJKoZIhvcNAQELBQAEggIAu1y3fLfQR/kOVDgxW4AB # GXZf2Khfh9XqjxZ6O/3M+X8skLZ7zhdEMfTDyesmcHjiNIm1idmlemjyeQa1kbPf # 5CPu8PqzyhwQCuDe/HK/UMYeQ4JEbN2/yzaYBy65oG1wCCgpipomBLrTbgcb9WRv # 2X0bUMPlpAslnGrR4N8RqVZGXvicHKzgcDlp99+txDRXOMIYo8y4DvEh1VHd80fK # pdx/9gqRnT6uK1MG9kUE4YgWQQzHkYFy4JGx+9JgC3NnR6VnPY7alZUwsRyAQIhx # 6fXlg0ESm4CgTzM7gqxf3of2eTTSdNKLBc6mwTGEsbDC0Mqi5aYryYOVKRdvNPCA # HKFhGQ2pTWr5VTSmMwoslRK3nYy5cg1Vtm85e2gnRL1evGXqHEdwne01l6olJXKs # goOvxk+swrqEBmN7BTCPaV7VoDJviTVO5CTd+9nXfmw++csG+45xMlwQhQvNIydJ # oTjnyJ4V/+amqaypRnsNrbjYcKEPj9wF94i1HMt1bx2M1GJYEU85RokEwjnF1vxm # Vc1OkpqslYOXRJL0LUxrA5+hpLAiYqXMlAruNBQhWzySCHxCKBsqtY+3liLf0Wgi # Z9vlszCfrDarf0rr1SJ6bl6R6vUJ009/7lhXFu4fuF0B+vqlAsnBixxBvUB0HwrB # RIa6FL4/cb2bMxfToyuB/+A= # SIG # End signature block
combined_dataset/train/non-malicious/sample_21_8.ps1
sample_21_8.ps1
#************************************************ # TS_2K3ProcessorAffinityMaskCheck.ps1 # Version 1.0.1 # Date: 5/16/2012 # Author: v-kaw # Description: [Idea ID 2346] [Windows] high cpu only on one processor # Rule number: 2346 # Rule URL: //sharepoint/sites/rules/Rule%20Submissions/Forms/DispForm.aspx?ID=2346 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 2346 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_2K3ProcessorAffinityMaskCheck" $PublicContent = "http://support.microsoft.com/kb/892100 " $InternalContent = "" $Verbosity = "Warning" $Visibility = "4" $SupportTopicsID = "8111" $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** $ProcessorNum = [Environment]::ProcessorCount # ************** # Detection Logic # ************** function GetProcessorAffinityMask() { $Path= 'HKLM:\System\CurrentControlSet\Services\NDIS\Parameters' if(Test-Path $Path) { return (Get-ItemProperty -Path $Path).ProcessorAffinityMask } } function CheckProcessorAffinityMask($AffinityMask) { switch($ProcessorNum){ 2 { if($AffinityMask -eq 3) { return $false } } 3 { if($AffinityMask -eq 7) { return $false } } 4 { if($AffinityMask -eq 15) { return $false } } default {return $true} } } #Check to see if rule is applicable to this computer if (($OSVersion.Major -eq 5) -and ($OSVersion.Minor -eq 2) -and ($ProcessorNum -gt 1)) #Windows Server 2003, Multiprocessor { $RuleApplicable = $true $ProcessorAffinityMask = GetProcessorAffinityMask if(($null -eq $ProcessorAffinityMask) -or # registry key doesn't exist (CheckProcessorAffinityMask $ProcessorAffinityMask) ) #check if ProcessorAffinityMask is set appropriately { $RootCauseDetected = $true add-member -inputobject $InformationCollected -membertype noteproperty -name "ProcessorAffinityMask current value" -value $ProcessorAffinityMask add-member -inputobject $InformationCollected -membertype noteproperty -name "Number of logical processors" -value $ProcessorNum } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -SolutionTitle $ScriptStrings.ID_2K3ProcessorAffinityMaskCheck_SD } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDmZ4MgiYNL5OLS # Yi4hLoAR4oZYJsZorCgkvmC4lv4Z6aCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFIRblJ99up/oC56X55obv/K # fadhuZy3Fxq2iWgLpaWoMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAj98zGWX2hFb7Tk3grS9zllkJ4ThU2nfUjLGu6PkYsriOFSj75FZJEO2H # S4oQntyNDj1uT2Ll3xSJo933SYAsH08zjcuadlJI7vdgpJUcSBc6LG1gqALk1FWA # 3YOZe6lg58vX8Rcgmir/rP4B8qWqnUAazXagn1yKYp3BiRDLs8llbP2J8UCIcK14 # a/tGwOckDhK+k0gs9PBZVfN6IkBvb+lguYALgqMumET2oJVz6t9uITaY1zUJQ7Iz # Cf3dDgK/xz/JGRn5JvYIcwacydJBiPLzyjnNRDvQqCSYcGD/zinIQDi5kM2t9uRJ # ZNkTI+Ropm7uSDsZwCq+dMRYgSSu2aGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAmzrYntwBIAE0YjAsWUWIL1E6ynLRViAvmxwoamddCwQIGZutgsUnr # GBMyMDI0MTAyODExNDA0MS44NzNaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9BdGhcDLPznlAAEAAAH0MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzA1OVoXDTI1MTAyMjE4MzA1OVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU5MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEApwhOE6bQgC9qq4jJGX2A # 1yoObfk0qetQ8kkj+5m37WBxDlsZ5oJnjfzHspqPiOEVzZ2y2ygGgNZ3/xdZQN7f # 9A1Wp1Adh5qHXZZh3SBX8ABuc69Tb3cJ5KCZcXDsufwmXeCj81EzJEIZquVdV8ST # lQueB/b1MIYt5RKis3uwzdlfSl0ckHbGzoO91YTKg6IExqKYojGreCopnIKxOvkr # 5VZsj2f95Bb1LGEvuhBIm/C7JysvJvBZWNtrspzyXVnuo+kDEyZwpkphsR8Zvdi+ # s/pQiofmdbW1UqzWlqXQVgoYXbaYkEyaSh/heBtwj1tue+LcuOcHAPgbwZvQLksK # aK46oktregOR4e0icsGiAWR9IL+ny4mlCUNA84F7GEEWOEvibig7wsrTa6ZbzuMs # yTi2Az4qPV3QRkFgxSbp4R4OEKnin8Jz4XLI1wXhBhIpMGfA3BT850nqamzSiD5L # 5px+VtfCi0MJTS2LDF1PaVZwlyVZIVjVHK8oh2HYG9T26FjR9/I85i5ExxmhHpxM # 2Z+UhJeZA6Lz452m/+xrA4xrdYas5cm7FUhy24rPLVH+Fy+ZywHAp9c9oWTrtjfI # KqLIvYtgJc41Q8WxbZPR7B1uft8BFsvz2dOSLkxPDLcXWy16ANy73v0ipCxAwUEC # 9hssi0LdB8ThiNf/4A+RZ8sCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBQrdGWhCtEs # Pid1LJzsTaLTKQbfmzAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA3cHSDxJKUDsg # acIfRX60ugODShsBqwtEURUbUXeDmYYSa5oFj34RujW3gOeCt/ObDO45vfpnYG5O # S5YowwsFw19giCI6JV+ccG/qqM08nxASbzwWtqtorzQiJh9upsE4TVZeKYXmbyx7 # WN9tdbVIrCelVj7P6ifMHTSLt6BmyoS2xlC2cfgKPPA13vS3euqUl6zwe7GAhjfj # NXjKlE4SNWJvdqgrv0GURKjqmamNvhmSJane6TYzpdDCegq8adlGH85I1EWKmfER # b1lzKy5OMO2e9IkAlvydpUun0C3sNEtp0ehliT0Sraq8jcYVDH4A2C/MbLBIwikj # wiFGQ4SlFLT2Tgb4GvvpcWVzBxwDo9IRBwpzngbyzbhh95UVOrQL2rbWHrHDSE3d # gdL2yuaHRgY7HYYLs5Lts30wU9Ouh8N54RUta6GFZFx5A4uITgyJcVdWVaN0qjs0 # eEjwEyNUv0cRLuHWJBejkMe3qRAhvCjnhro7DGRWaIldyfzZqln6FsnLQ3bl+ZvV # JWTYJuL+IZLI2Si3IrIRfjccn29X2BX/vz2KcYubIjK6XfYvrZQN4XKbnvSqBNAw # IPY2xJeB4o9PDEFI2rcPaLUyz5IV7JP3JRpgg3xsUqvFHlSG6uMIWjwH0GQIIwrC # 2zRy+lNZsOKnruyyHMQTP7jy5U92qEEwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAv+LZ/Vg0s17Xek4iG9R9c/7+AI6ggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJ784wIhgPMjAyNDEwMjgxMTExMTBaGA8yMDI0MTAyOTExMTExMFowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6snvzgIBADAHAgEAAgIRQTAHAgEAAgITcjAK # AgUA6stBTgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAhvpi0fcwW36Vj # kxJvXWTKNHB3jvDpp2sJGsfeVTvr0wqWqBrbYtmbUuVe97LNopMBBaWBVq2RlfPa # sIxDtxHDTn5LPhbHb5DWH/NZWb+28zXE1+Y5sevsEdvsFxcDLB5CurWs+Z+iXqcd # rGqWwlcV+WX6dpuy3/dPiBzA5ZYhHiQgBr6+GCyDGjEB9T76pHsFqwSZHJ4+hXZB # 9EMgikB45MhUWxkF4tLdq1JMiZWtZmjsOTbveG4Y338S6Qpt3I6sMkaFL+Dn9fLJ # wn4WwMtfXG/6gRGDUIlgE+If7xvhMCC+iUcbAyLLjXkn+yis2mNx8vI42scFI8SU # P7qoQ0p/MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH0F0aFwMs/OeUAAQAAAfQwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgAZmSxwhsSs78 # q9bXWlKe8FuypiCa98HJjub/pwW6f2owgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCA/WMJ8biaT6njvkknB8Q7hSQIi8ys6vIBvZg60RBjWazCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9BdGhcDLPznlAAEAAAH0 # MCIEIGm6buvOuOZ0hj0c+A3dmkblkgOGsbCdq3o77OaNJ5IJMA0GCSqGSIb3DQEB # CwUABIICAD5/keKDpY1mvnh+MbyeFnCa9RiijCPwRqJH0xxeCXWCdPqkB6vD2Imy # 5DpXcC7438kpkyesaNqeyASBqxFk0ow7K4ow9Q8Z5qaB8MaqxlhFLMLmenqp+RHj # 7w/9XEzHSx0fPnnWEvqysGPKXfZenJ3fIv7hPmW88ELtnG68XXaj9eEj6YHY65wm # mvbpihd4mJzU4fC/5mQFaZDL6PUjZFhu6W0MxOpRIwHUbS7lrFmjrtM126QEgdBy # L193V4Y7OzlJdHmVfR4HHJSf29qjOEroLfAPOWcBp/lvGCrHpOZ3DBOGYiffDBXv # F6E7kj/eIpgUVsBOHbDcPTjy7NkTpYKt0vOuJ17pkNjyeM7zoNJAr/WXzCKxtPHi # uZ4z1UqJ5qNWgVWvKdSLoX/UdJKUk1uAmM59MXz8njQD59FKVoIMdm6u6CfIoIX4 # komvthv3GDhZ0XpVEt8Of2QDsHVxP8PAK440qxejqeGoV6SURPEHw9Xe/7FyAi3I # q85+xKBPCcQShEZM0mD3gQnoDcFkKqOoa8aM462ghSN+oOd016TShMhNX31+E22c # g0632xlauqPVIipdAWPNFmgv1w6gBfG3FtSpYxmob/7vJriYpLeQaRgmEAiEUVvK # Y2gqSZcDVnC760o2MaIpW/S3a5OCLULCYPgTYATNcgLBYp33abbR # SIG # End signature block
combined_dataset/train/non-malicious/2759.ps1
2759.ps1
function GetBase64GzippedStream { Param( [Parameter(Mandatory=$True,Position=0)] [System.IO.FileInfo]$File ) $memFile = New-Object System.IO.MemoryStream (,[System.IO.File]::ReadAllBytes($File)) $memStrm = New-Object System.IO.MemoryStream $gzStrm = New-Object System.IO.Compression.GZipStream $memStrm, ([System.IO.Compression.CompressionMode]::Compress) $gzStrm.Write($memFile.ToArray(), 0, $File.Length) $gzStrm.Close() $gzStrm.Dispose() [System.Convert]::ToBase64String($memStrm.ToArray()) } function add-zip { param([string]$zipfilename) if (-not (Test-Path($zipfilename))) { Set-Content $zipfilename ("PK" + [char]5 + [char]6 + ("$([char]0)" * 18)) (dir $zipfilename).IsReadOnly = $false } $shellApplication = New-Object -com shell.application $zipPackage = $shellApplication.NameSpace($zipfilename) foreach($file in $input) { $zipPackage.CopyHere($file.FullName) Start-Sleep -milliseconds 100 } } $pfconf = (Get-ItemProperty "hklm:\system\currentcontrolset\control\session manager\memory management\prefetchparameters").EnablePrefetcher Switch -Regex ($pfconf) { "[1-3]" { $zipfile = (($env:TEMP) + "\" + ($env:COMPUTERNAME) + "-PrefetchFiles.zip") if (Test-Path $zipfile) { rm $zipfile -Force } ls $env:windir\Prefetch\*.pf | add-zip $zipfile $obj = "" | Select-Object FullName,Length,CreationTimeUtc,LastAccessTimeUtc,LastWriteTimeUtc,Content $Target = ls $zipfile $obj.FullName = $Target.FullName $obj.Length = $Target.Length $obj.CreationTimeUtc = $Target.CreationTimeUtc $obj.LastAccessTimeUtc = $Target.LastAccessTimeUtc $obj.LastWriteTimeUtc = $Target.LastWriteTimeUtc $obj.Content = GetBase64GzippedStream($Target) $obj $suppress = Remove-Item $zipfile } default { } }
combined_dataset/train/non-malicious/364.ps1
364.ps1
function Register-PSFTypeSerializationData { [CmdletBinding(HelpUri = 'https://psframework.org/documentation/commands/PSFramework/Register-PSFTypeSerializationData')] Param ( [Parameter(ValueFromPipeline = $true, Mandatory = $true)] [string[]] $TypeData, [string] $Path = (Get-PSFConfigValue -FullName 'PSFramework.Serialization.WorkingDirectory' -Fallback $script:path_typedata) ) begin { if (-not (Test-Path $Path -PathType Container)) { $null = New-Item -Path $Path -ItemType Directory -Force } } process { foreach ($item in $TypeData) { $name = $item -split "`n" | Select-String "<Name>(.*?)</Name>" | Where-Object { $_ -notmatch "<Name>Deserialized.|<Name>PSStandardMembers</Name>|<Name>SerializationData</Name>" } | Select-Object -First 1 | ForEach-Object { $_.Matches[0].Groups[1].Value } $fullName = Join-Path $Path.Trim "$($name).Types.ps1xml" $item | Set-Content -Path $fullName -Force -Encoding UTF8 Update-TypeData -AppendPath $fullName } } end { } }
combined_dataset/train/non-malicious/sample_11_19.ps1
sample_11_19.ps1
##------------------------------------------------------------------ ## <copyright file="Invoke-ParsingEngine.ps1" company="Microsoft"> ## Copyright (C) Microsoft. All rights reserved. ## </copyright> ##------------------------------------------------------------------ Param ( [Parameter(Mandatory=$false)] [System.String] $TaskName = "ParsingEngineTask", [Parameter(Mandatory = $true)] [System.String] $FactorySharePath, [Parameter(Mandatory = $true)] [System.String] $ParsingEnginePackagePath, [Parameter(Mandatory = $true)] [System.String] $GmaPackageContentPath, [Parameter(Mandatory=$false)] [System.String] $TranscriptFolderPath = "$env:SystemDrive\Observability\MASLogs\ParsingEngineTaskTranscripts", [Parameter(Mandatory=$false)] [Switch] $ParseOnce ) $functionName = $MyInvocation.MyCommand.Name # TODO: Emit a Windows Event here, but for now use Transcript function $transcriptFileName = "{0}.{1:yyyy-MM-dd}.log" -f $TaskName, $(Get-Date) $transcriptFilePath = Join-Path -Path $TranscriptFolderPath -ChildPath $transcriptFileName Start-Transcript -Path $transcriptFilePath -Append $curDirectory = Split-Path -parent $MyInvocation.MyCommand.Definition Import-Module "$PSScriptRoot\ExtensionHelper.psm1" Import-Module "$GmaPackageContentPath\GMATenantJsonHelper.psm1" -DisableNameChecking Import-Module "$curDirectory\StandaloneObservabilityConstants.psm1" $resultFilePath = "$TranscriptFolderPath\Result.json" try { Push-Location $TranscriptFolderPath if ($ParseOnce) { if (Get-IsArcAEnvironment) { # Starting ParsingEngine with factory share path, watermarking enabled, and retries Write-Log "$functionName : Going to start ParsingEngine $ParsingEnginePackagePath for logs from $FactorySharePath." -WriteToConsole $diagPathJson = ConvertTo-Json -InputObject $FactorySharePath $parsingEngineArg = 'IngestionInfo:{"RetainLogsAfterParsing":"true","LogDirectoryPath":' + $diagPathJson + "}" Write-Log "$functionName : Parsing command argument $parsingEngineArg." -WriteToConsole $parsingEngineExe = "$ParsingEnginePackagePath\$($PipelineConstants.ParsingEngineExeName)" $totalRetries = 0 $maxNumberRetries = 3 $completedSuccessfully = $false do { $totalRetries++ Write-Log "$functionName : Running parsing command $parsingEngineExe $parsingEngineArg" -WriteToConsole & $parsingEngineExe $parsingEngineArg # Check for status on completion $results = Get-Content -Path $resultFilePath $resultJson = ConvertFrom-Json -InputObject $results if ($resultJson.Failed) { $failureMessage = "ParsingEngine failed on retry $totalRetries/$maxNumberRetries" if ($totalRetries -lt $maxNumberRetries) { Write-Log "$functionName : ParsingEngine Result $results." -WriteToConsole $errorDetails = "ErrorCode: '$($resultJson.ErrorCode)', Exception: '$($resultJson.Exception)'" Write-Log "$functionName : $failureMessage with $errorDetails. Retrying..." -Level WARN -WriteToConsole } else { Write-Log "$functionName : $failureMessage. Retries exhausted." -Level WARN -WriteToConsole } } else { $completedSuccessfully = $true } } while (-not $completedSuccessfully -and ($totalRetries -lt $maxNumberRetries)) } else { # Starting ParsingEngine with factory share path Write-Log "$functionName : Going to start ParsingEngine $ParsingEnginePackagePath for logs from $FactorySharePath." -WriteToConsole $diagPathJson = ConvertTo-Json -InputObject $FactorySharePath $parsingEngineArg = 'IngestionInfo:{"DisableWaterMarking":"true","RetainLogsAfterParsing":"true","LogDirectoryPath":' + $diagPathJson + "}" Write-Log "$functionName : Parsing command argument $parsingEngineArg." -WriteToConsole $parsingEngineExe = "$ParsingEnginePackagePath\$($PipelineConstants.ParsingEngineExeName)" Write-Log "$functionName : Parsing command $parsingEngineExe $parsingEngineArg" -WriteToConsole & $parsingEngineExe $parsingEngineArg } } else { # Starting ParsingEngine with diagnostics logs $diagPath = Join-Path -Path $FactorySharePath -ChildPath "Diagnostics" Write-Log "$functionName : Going to start ParsingEngine $ParsingEnginePackagePath for logs from $diagPath." -WriteToConsole $diagPathJson = ConvertTo-Json -InputObject $diagPath $parsingEngineArg = 'IngestionInfo:{"LogDirectoryPath":'+ $diagPathJson +"}" Write-Log "$functionName : Parsing command argument $parsingEngineArg." -WriteToConsole $parsingEngineExe = "$ParsingEnginePackagePath\$($PipelineConstants.ParsingEngineExeName)" Write-Log "$functionName : Parsing command $parsingEngineExe $parsingEngineArg" -WriteToConsole & $parsingEngineExe $parsingEngineArg # Starting ParsingEngine with telemetry logs $telPath = Join-Path -Path $FactorySharePath -ChildPath "Telemetry" Write-Log "$functionName : Going to start ParsingEngine $ParsingEnginePackagePath for logs from $telPath." -WriteToConsole $telPathJson = ConvertTo-Json -InputObject $telPath $parsingEngineArg = 'IngestionInfo:{"GenerateTelemetryEvents":"true","LogDirectoryPath":'+ $telPathJson +"}" $parsingEngineExe = "$ParsingEnginePackagePath\$($PipelineConstants.ParsingEngineExeName)" Write-Log "$functionName : Parsing command $parsingEngineExe $parsingEngineArg" -WriteToConsole & $parsingEngineExe $parsingEngineArg } Write-Log "$functionName : Reading ParsingEngine result from $resultFilePath." -WriteToConsole $results = Get-Content -Path $resultFilePath Write-Log "$functionName : ParsingEngine Result $results." -WriteToConsole $resultJson = ConvertFrom-Json -InputObject $results if($resultJson.Failed) { throw $resultJson.Exception } } finally { Pop-Location # TODO: Emit a Windows Event here, but for now use Transcript function Stop-Transcript } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBgg6R3fDe2OK6x # c206xVwUjhEdWDdOPczkGIXK3TFgz6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDOvqjfyIzMkPLycIJBz6cHn # /xhUGHcSorvpaeDhO4UOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAb2aGnMLsMYCNDlOZP46HVo3guLNCFG8PuY4E2Qd1mRyPkKFfV2f2bXzq # R92HalcDUcNIQCzU5G8I9b6ZdB3Aj9dZ5qhKSE4ePoN829G47xmt3oaKI35oF16D # jmRWkIa+t/uWkd/i2mXrcd9mI1IGZfEH+v0MF4SBp5xVATKMkFWKuktesH36YDeX # /gUbflhhDFSO1bKqAMoSEBto3wTS9I7Y6oe0tOk7/Ug6bv1Skwr/Zwd3oAcxE272 # u9VpnCHsgHxEkbcGPJKLNV78e26wUZj0pgRekR1RwOWQTrJl/OoymJ+eNgB8afl5 # u71kYgADBEvU9XAsZj3gQ6HEXF4QeqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDMGmf/T+inDbqitHLWwRHLkJPpatUJl5LvoVNR7REgfgIGZbqk0R/8 # GBMyMDI0MDIxMjE0MDg0My44NjJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA # 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/ # fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly # OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc # Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgsR6UZKyw1YFFfTx1krM6PS9sKuO5dAA7SuFKAAM3WwUwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/ # /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ # lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao # MA0GCSqGSIb3DQEBCwUABIICAKXPbeOoxavJCAgVe9gpSGghDtEHCCTr3q6cumbc # zA+32euz4kvHkBjZfYYJOTeEPZhxmVGhsx94REEXxCxE2gtrlMdbe7c4YeAEXbv+ # J5b3pjSLodMBgQkRN4uVvsXqxKxakw8mjcUUfgc1TGm70RDoznP2f4H27yDFW2ZO # MWg+iMuSqTY2rQ0TN//K3kl7boMSv8bO8Cgr93MoUHA5/yQq8bMLftzOdEpEOyJA # CDJNnt04frP6iqXoNJqjh4UUH2ZrjwMF6J2Nj5nVdSeduELt5u4GurGpPEAVBHL/ # ZJmJPA750GEkmqB1+fNjB8vvrPuPimGo3nNKjFg/9Gq8E2Fu7yHCxdpl1GuiGDlL # SwGTLAC5FNbN2aJGq9Ve3E7YG+NlPCIk2FwO5u30o2EUOwVjWJqD+p/k9cddNGzm # Xm7nhSyocXIRqjnRTWvHvXsBYqqUaC9imhaCEJi2XP9WxQmPCIWmxPFFF3aRrc75 # 7SMkrDtGZROtlRVG7T2JUSSkV4KKkiI+wkVlNO5mUE0SQ4AD4qd5QWYJUhO8pSS9 # xXFexO7LKqG7rs9niPY94Sp5GnkSzwxbu5bmKxnFGvRhqBIcvc36GkMNu505iYyX # YCIxHWwaEeCqdft71FO/FEGSs8sywzyDoQwMXOJMWfaW1BIXddI3JUSJwMmOK8av # CDXL # SIG # End signature block
combined_dataset/train/non-malicious/276.ps1
276.ps1
function Connect-ExchangeOnPremises { PARAM ( [Parameter(Mandatory,HelpMessage= 'http://<ServerFQDN>/powershell')] [system.string]$ConnectionUri, $Credential = [System.Management.Automation.PSCredential]::Empty ) $Splatting = @{ ConnectionUri = $ConnectionUri ConfigurationName = 'microsoft.exchange' } IF ($PSBoundParameters['Credential']){$Splatting.Credential = $Credential} Import-PSSession -Session (New-pssession @Splatting) }
combined_dataset/train/non-malicious/Compare Reg Keys.ps1
Compare Reg Keys.ps1
<# .SYNOPSIS Compares Registry Key Properties and subkeys across multiple computers .DESCRIPTION The function Get-AllRegKey will recurse down from a given key, returning an array having the key's properties, subkeys, and their properties and subkeys. Provide Get-AllRegKey a list of computernames, and it will remote to those computers and return the properties, etc. of the same key on the remote computer Provide function Compare-AllRegKey with the name of the reference computer, a list of two or more computer names, and it will call Get-AllRegKey to retrieve the key information from all the listed computers, then use Compare-Object to return just the differences. If you want more control over the Compare-Object step, you should modify the function (suggestions welcome for an efficient/concise way to add Compare-Object parameters to the Compare-AllRegKey function) .PARAMETER ComputerNames In the Get-AllRegKey function this is a single computer name or an array of computer names In the Compare-AllRegKey function, this must be an array of at least two computer names .PARAMETER RegKey a single registry key/hive from which recursion starts, using the Registry Provider syntax The value defaults to the current-scoped variable $DefaultRegistryKey .PARAMETER -ReferenceObject Applies only to the Compare-AllRegKey function, this parameter identifies the computer against which the other computers are compared. This string must be one of the computer names found in the ComputerNames parameter. .EXAMPLE C:\\PS> Get-AllRegKey .EXAMPLE C:\\PS> Get-AllRegKey -RegistryKey 'HKLM:\\SOFTWARE\\Microsoft\\PowerShell' .EXAMPLE C:\\PS> Get-AllRegKey -ComputerNames @('localhost','RemoteCN') .EXAMPLE C:\\PS> Get-AllRegKey -ComputerNames @('localhost','Computer1','Computer2') .EXAMPLE C:\\PS> Get-AllRegKey localhost 'HKLM:\\SOFTWARE\\Microsoft\\PowerShell' .EXAMPLE C:\\PS> Compare-AllRegKey -ComputerNames @('localhost','RemoteCN') .EXAMPLE C:\\PS> Compare-AllRegKey -ComputerNames @('CN1','CN2') -ReferenceObject CN2 #> ################################################################################ # Default values for the Registry Key and the list of computernames $DefaultRegistryKey='HKLM:\\SOFTWARE\\Microsoft\\PowerShell' $computerNames= @('localhost','ncat099') ################################################################################ # The scriptblock that does the actual work of creating an object representing a # registry key and all it's properties and subkeys and their properties. No Defaults # This is recursive and remoteable $_getRegKeySB = {Param($RegistryHive) # Create a local named function function _getRegKey { Param($RegistryHive) # $data is an array, local to each loop of the recursion # initialize it with the name of the hive/key $data=@($RegistryHive) # Get the hive/keys properties, excluding the ones added by PS $props = Get-ItemProperty -Path $RegistryHive | Select * -Exclude PS*Path,PSChildName,PSDrive,PSProvider # if $props is empty, piping it to get-member produces an error message # so test it for non-null first if ($props) { $props = $props | get-member -memberType NoteProperty # prepend each property with the full name of the key, and add it to $data foreach ($p in $props) {$data+=("$RegistryHive`:"+$p.Definition)} } # recursivly call the same algorithm for any subkeys of the hive/key foreach ($sk in (get-item $RegistryHive).GetSubKeyNames()) { # if there are any subkeys, append their data to the current data. # Use the full name of the key $data += (&_getRegKey (($RegistryHive)+'\\'+ $sk)) } # the local named function's output is the array representation of the hive/key $data } # Call the local named function &_getRegKey $RegistryHive } ################################################################################ # Across all computers, get the key and subkeys from the registry # returns a hash of array objects, keyed by computer name function Get-AllRegKey { Param ( # Single computer name or an array of computer names. # Defaults to the "current scoped variable by the same name" $computerNames = $computerNames # A valid key ,$RegistryKey = $DefaultRegistryKey ) # create the empty hash $AllRegKey = @{} # iterate over each computer name foreach ($cn in $computerNames) { switch ($cn) { # If the computer name is localhost, or the same name as hostname # use the Call operator to call the scriptblock, and assign the array returned # to the hash using the current computername as the key {$_ -match "localhost|" + (hostname)} { $AllRegKey.$cn = &$_getRegKeySB $RegistryKey break } # for all other computer names, execute the command remotely using invoke-command default { # pass the scriptblock to the remote computers # assign the array returned to the hash using the current computername as the key $AllRegKey.$cn = (invoke-command -Scriptblock $_getRegKeySB ` -ArgumentList $RegistryKey -computername "$cn") } } } #return the hash of arrays $AllRegKey } ################################################################################ # Across all computers, get the key and subkeys from the registry # returns a hash of array objects, keyed by computer name function Compare-AllRegKey { Param ( # Must be an array, with 2 or more members; # defaults to the "current scoped variable by the same name" $computerNames = $computerNames # A valid key ,$RegistryKey = $DefaultRegistryKey # The name of the computer to use as the reference ,$ReferenceObject ) Begin { # If the argument for $ReferenceObject is null, then default # to the first element of $computerNames if (!$ReferenceObject) {$ReferenceObject =$computerNames[0]} else { # Validate that the $referenceObject is an element of $computerNames if (!($computerNames -contains $ReferenceObject)) { throw ("{0} is not a member of the list {1}" -f $ReferenceObject, ` ($computerNames -join ','))} } # Get the Registry Key data for all computers $AllRegKey = Get-AllRegKey $computerNames $RegistryKey } Process { # Iterate over the computernames, excluding the $ReferenceObject $diff = @{}; foreach ($cn in $computerNames | Where {$cn -ne $ReferenceObject}) { # compare $ReferenceObject to the remaining objects, accumulate into $diff $diff.$cn = Compare-Object -ReferenceObject $AllRegKey.$ReferenceObject ` $AllRegKey.$cn | Where-Object { ` ($_.SideIndicator -eq '=>') -or ($_.SideIndicator -eq '<=') } } # Return the difference hash $diff } } # The following lines will compare the default registry key # across the default array of computernames Compare-AllRegKey
combined_dataset/train/non-malicious/sample_32_27.ps1
sample_32_27.ps1
# # Module manifest for module 'OCI.PSModules.Marketplacepublisher' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Marketplacepublisher.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '16f2e498-6e6b-4e22-8c36-b6c2677410c6' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Marketplacepublisher Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Marketplacepublisher.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIMarketplacepublisherAndPublishArtifact', 'Enable-OCIMarketplacepublisherTermVersion', 'Get-OCIMarketplacepublisherArtifact', 'Get-OCIMarketplacepublisherArtifactsList', 'Get-OCIMarketplacepublisherCategoriesList', 'Get-OCIMarketplacepublisherCategory', 'Get-OCIMarketplacepublisherListing', 'Get-OCIMarketplacepublisherListingRevision', 'Get-OCIMarketplacepublisherListingRevisionAttachment', 'Get-OCIMarketplacepublisherListingRevisionAttachmentsList', 'Get-OCIMarketplacepublisherListingRevisionNote', 'Get-OCIMarketplacepublisherListingRevisionNotesList', 'Get-OCIMarketplacepublisherListingRevisionPackage', 'Get-OCIMarketplacepublisherListingRevisionPackagesList', 'Get-OCIMarketplacepublisherListingRevisionsList', 'Get-OCIMarketplacepublisherListingsList', 'Get-OCIMarketplacepublisherMarket', 'Get-OCIMarketplacepublisherMarketsList', 'Get-OCIMarketplacepublisherProduct', 'Get-OCIMarketplacepublisherProductsList', 'Get-OCIMarketplacepublisherPublisher', 'Get-OCIMarketplacepublisherPublishersList', 'Get-OCIMarketplacepublisherTerm', 'Get-OCIMarketplacepublisherTermsList', 'Get-OCIMarketplacepublisherTermVersion', 'Get-OCIMarketplacepublisherTermVersionsList', 'Get-OCIMarketplacepublisherWorkRequest', 'Get-OCIMarketplacepublisherWorkRequestErrorsList', 'Get-OCIMarketplacepublisherWorkRequestLogsList', 'Get-OCIMarketplacepublisherWorkRequestsList', 'Invoke-OCIMarketplacepublisherCascadingDeleteListing', 'Invoke-OCIMarketplacepublisherCascadingDeleteListingRevision', 'Invoke-OCIMarketplacepublisherCloneListingRevision', 'Invoke-OCIMarketplacepublisherMarkListingRevisionPackageAsDefault', 'Invoke-OCIMarketplacepublisherPublishListingRevision', 'Invoke-OCIMarketplacepublisherPublishListingRevisionAsPrivate', 'Invoke-OCIMarketplacepublisherPublishListingRevisionPackage', 'Invoke-OCIMarketplacepublisherSubmitListingRevisionForReview', 'Invoke-OCIMarketplacepublisherUnPublishListingRevisionPackage', 'Invoke-OCIMarketplacepublisherWithdrawListingRevision', 'Move-OCIMarketplacepublisherArtifactCompartment', 'Move-OCIMarketplacepublisherListingCompartment', 'Move-OCIMarketplacepublisherListingRevisionToNewStatus', 'Move-OCIMarketplacepublisherTermCompartment', 'New-OCIMarketplacepublisherArtifact', 'New-OCIMarketplacepublisherListing', 'New-OCIMarketplacepublisherListingRevision', 'New-OCIMarketplacepublisherListingRevisionAttachment', 'New-OCIMarketplacepublisherListingRevisionNote', 'New-OCIMarketplacepublisherListingRevisionPackage', 'New-OCIMarketplacepublisherTerm', 'New-OCIMarketplacepublisherTermVersion', 'Remove-OCIMarketplacepublisherArtifact', 'Remove-OCIMarketplacepublisherListing', 'Remove-OCIMarketplacepublisherListingRevision', 'Remove-OCIMarketplacepublisherListingRevisionAttachment', 'Remove-OCIMarketplacepublisherListingRevisionNote', 'Remove-OCIMarketplacepublisherListingRevisionPackage', 'Remove-OCIMarketplacepublisherTerm', 'Remove-OCIMarketplacepublisherTermVersion', 'Stop-OCIMarketplacepublisherWorkRequest', 'Update-OCIMarketplacepublisherArtifact', 'Update-OCIMarketplacepublisherListing', 'Update-OCIMarketplacepublisherListingRevision', 'Update-OCIMarketplacepublisherListingRevisionAttachment', 'Update-OCIMarketplacepublisherListingRevisionAttachmentContent', 'Update-OCIMarketplacepublisherListingRevisionIconContent', 'Update-OCIMarketplacepublisherListingRevisionPackage', 'Update-OCIMarketplacepublisherTerm', 'Update-OCIMarketplacepublisherTermVersion', 'Update-OCIMarketplacepublisherTermVersionContent' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Marketplacepublisher' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/4015.ps1
4015.ps1
workflow Use-WorkflowCheckpointSample { Write-Output "Before Checkpoint." start-sleep -s 20 Checkpoint-Workflow Write-Output "After Checkpoint." }
combined_dataset/train/non-malicious/sample_61_34.ps1
sample_61_34.ps1
# # Script module for module 'Az.Compute' that is executed when 'Az.Compute' is imported in a PowerShell session. # # Generated by: Microsoft Corporation # # Generated on: 07/31/2024 06:54:55 # $PSDefaultParameterValues.Clear() Set-StrictMode -Version Latest function Test-DotNet { try { if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 }))) { throw ".NET Framework versions lower than 4.7.2 are not supported in Az. Please upgrade to .NET Framework 4.7.2 or higher." } } catch [System.Management.Automation.DriveNotFoundException] { Write-Verbose ".NET Framework version check failed." } } function Preload-Assembly { param ( [string] $AssemblyDirectory ) if($PSEdition -eq 'Desktop' -and (Test-Path $AssemblyDirectory -ErrorAction Ignore)) { try { Get-ChildItem -ErrorAction Stop -Path $AssemblyDirectory -Filter "*.dll" | ForEach-Object { try { Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null } catch { Write-Verbose $_ } } } catch {} } } if ($true -and ($PSEdition -eq 'Desktop')) { if ($PSVersionTable.PSVersion -lt [Version]'5.1') { throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher." } Test-DotNet } if ($true -and ($PSEdition -eq 'Core')) { if ($PSVersionTable.PSVersion -lt [Version]'6.2.4') { throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher." } } if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore) { Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object { . $_.FullName } } # [windows powershell] preload assemblies # [windows powershell] preload module alc assemblies $preloadPath = (Join-Path $PSScriptRoot -ChildPath "ModuleAlcAssemblies") Preload-Assembly -AssemblyDirectory $preloadPath if (Get-Module AzureRM.profile -ErrorAction Ignore) { Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") } $module = Get-Module Az.Accounts if ($module -ne $null -and $module.Version -lt [System.Version]"3.0.3") { Write-Error "This module requires Az.Accounts version 3.0.3. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop } elseif ($module -eq $null) { Import-Module Az.Accounts -MinimumVersion 3.0.3 -Scope Global } Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Compute.dll) if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore) { Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object { . $_.FullName } } $FilteredCommands = @('New-AzAvailabilitySet:ResourceGroupName','Remove-AzAvailabilitySet:ResourceGroupName','Get-AzVMADDomainExtension:ResourceGroupName','Set-AzVMADDomainExtension:ResourceGroupName','Get-AzVMAEMExtension:ResourceGroupName','Remove-AzVMAEMExtension:ResourceGroupName','Set-AzVMAEMExtension:ResourceGroupName','Test-AzVMAEMExtension:ResourceGroupName','Set-AzVMBginfoExtension:ResourceGroupName','Get-AzVMCustomScriptExtension:ResourceGroupName','Remove-AzVMCustomScriptExtension:ResourceGroupName','Get-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMDiagnosticsExtension:ResourceGroupName','Set-AzVMDiagnosticsExtension:ResourceGroupName','Remove-AzVMExtension:ResourceGroupName','Set-AzVMExtension:ResourceGroupName','Get-AzVMSqlServerExtension:ResourceGroupName','New-AzVMSqlServerAutoBackupConfig:ResourceGroupName','New-AzVMSqlServerKeyVaultCredentialConfig:ResourceGroupName','Remove-AzVMSqlServerExtension:ResourceGroupName','Set-AzVMSqlServerExtension:ResourceGroupName','Get-AzVMAccessExtension:ResourceGroupName','Remove-AzVMAccessExtension:ResourceGroupName','Set-AzVMAccessExtension:ResourceGroupName','Get-AzRemoteDesktopFile:ResourceGroupName','Get-AzVMBootDiagnosticsData:ResourceGroupName','Remove-AzVMDscExtension:ResourceGroupName','Set-AzVMDscExtension:ResourceGroupName','Get-AzVMChefExtension:ResourceGroupName','Remove-AzVMChefExtension:ResourceGroupName','Set-AzVMChefExtension:ResourceGroupName','Remove-AzVMBackup:ResourceGroupName','Disable-AzVMDiskEncryption:ResourceGroupName','Get-AzVMDiskEncryptionStatus:ResourceGroupName','Remove-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMDiskEncryptionExtension:ResourceGroupName','Set-AzVMBackupExtension:ResourceGroupName','Disable-AzVmssDiskEncryption:ResourceGroupName','Get-AzVmssVMDiskEncryption:ResourceGroupName','Set-AzVmssDiskEncryptionExtension:ResourceGroupName','New-AzDiskAccess:ResourceGroupName','Get-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservation:ResourceGroupName','New-AzCapacityReservationGroup:ResourceGroupName','Remove-AzCapacityReservation:ResourceGroupName','Get-AzHostSize:ResourceGroupName','Get-AzDiskEncryptionSetAssociatedResource:ResourceGroupName','New-AzProximityPlacementGroup:ResourceGroupName','Set-AzVmssVM:ResourceGroupName','Set-AzVmss:ResourceGroupName','Update-AzVmss:ResourceGroupName','Get-AzRestorePoint:ResourceGroupName','Get-AzRestorePointCollection:ResourceGroupName','New-AzRestorePoint:ResourceGroupName','Remove-AzRestorePoint:ResourceGroupName','Remove-AzRestorePointCollection:ResourceGroupName','Update-AzRestorePointCollection:ResourceGroupName','New-AzSshKey:ResourceGroupName','Get-AzVMRunCommand:ResourceGroupName','Get-AzVmssVMRunCommand:ResourceGroupName') if ($Env:ACC_CLOUD -eq $null) { $FilteredCommands | ForEach-Object { $existingDefault = $false foreach ($key in $global:PSDefaultParameterValues.Keys) { if ($_ -like "$key") { $existingDefault = $true } } if (!$existingDefault) { $global:PSDefaultParameterValues.Add($_, { if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null) { $context = Get-AzureRmContext } else { $context = Get-AzContext } if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) { $context.ExtendedProperties["Default Resource Group"] } }) } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCKkt8fMjmON614 # Ulvk5MYDe7Txs4yhpkzLYP1DRUCVrKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIF/tbmR9Ej4wbW030dERCMqC # 0nKVmjvIZo3fM4B7f7H+MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAuy604eRhiEO+oXDLqeQGWKAoLCcnA0dzMKZN7uo8aTJP2DCDPS5QfxFF # 1XUlALt2+iLB3b3S5FZiO5TUbk/8xX7r3tw5j9gn4AkuNumBUloiT0ns65K2lk+3 # Cu24HySRcSjAkwRxzVwtmKk0wYS8Be1lsxmJ/W0Viw6pEJz+VLBsZR8FbANwdQO9 # x/oimI6UOy/fa6SkIgiJ+hcH8zSan4vYEt1x6xBAJRUFxYvGKDnP5iezz32540XL # sE95dqHRo20LLcjyOGUUPZeFWq+1IDaMW/D0GR9diaLrlkra4UEOVwvAotWu3kyh # nXDrotWTjue5vh5OkDM6oU0ln4PlyKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDDV//K9V/K4yBc/C50mtguoScf+oAZI137Y4zYj69o7wIGZpetymWw # GBMyMDI0MDczMTA3MDA0NC43MTNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC # OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x # sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb # aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb # 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy # S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS # 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU # bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9 # TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp # TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa # GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu # h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+ # XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg # dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI # gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr # uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld # mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd # qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa # 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL # 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC # +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg # jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL # sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH # N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6 # bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy # QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOpT9tgwIhgPMjAyNDA3MzEwNzMzNDRaGA8yMDI0MDgwMTA3MzM0NFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6lP22AIBADAHAgEAAgIcSzAHAgEAAgIgczAKAgUA # 6lVIWAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAHOpffy0QyV+0jeXe+3n # gQrsr25fx0Y0FoYyYQ6Db+kP/EWRaOW5yJYVzbMTXmXZZ1B+mpc8tvYCnw5bxWHT # FOs1fw7ErreemwjzGwXJAWQE+4qwbu0sBFY0rSPf6+R3jRpkGevsSFQg5CQDlE6v # KnnnzEBZ4fwZooXtOtMwVaNvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgWQd9JIOlBCzH2T7ikY2NANdJmFLqcVaKinFF614Uo0UwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34d # ezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3p5I # npafKEQ9AAEAAAHeMCIEID1OAzK1/Wc/iomxipjPCilJXDo/OKgUaWKoACw0DZsr # MA0GCSqGSIb3DQEBCwUABIICAGxV+8l422NN1r4Ial9bmNgWRsidj9LVmZ0VakIP # 32IMfDGfiVBdO08nK8/+bYsr135ECmWRUuA3x+Ny0F5CtHi5Kx7HyAwvdyjWpJZ6 # LyxcTLVR1D93IUdxrOv6z2j+6BypwlnNxTcGGSPVzxGBnpmgdSArbcDIvF/Pjmkz # aECPas4FWH3lwWhrFsiLbDuegEIUfuy8kikyWNEOkFH6Y5ns+FzIw/09JahcWSnu # fsh6o57I5OGzeBxEoYC3hybKTWBn1Lib+eKCDiy0MSHmw3Ts93vS46HUXyHKx6K1 # XdiD/UVzIapgRcR6G3rJA+SECwsIO2oKB6vQ4tmBdLUPMEuHmQ7uNRNTlOgCmmNj # kUH24YceiT3QBdLiqlskGBOZkOUh3ojek4WM9R42YZEkLlAJ4bKMZJDTPrLGY58E # 7a7Xb6Opex2YHA7CtMHUwuGeoTmKygBqY2+RzakAbKMMnncOjjK3/GXBa39DEJiD # kZaSc3F5HlfW3r/S4u9jzJHAaktVa9iJ7KxJG7sruT7gpzQfWxQTwlm3TJSiK1KT # dobinr4C9mcP8R1JmZub0S+oZVzkttLQD3cKrVD8zm0E/9q2L9rGT2KQJ5h/9Llc # bG289xXE60c4DMNOpnkuMkijMKgimBNqsO4a7jq/n4GqrEPe23j45bCdfxhep+Gc # Q+8U # SIG # End signature block
combined_dataset/train/non-malicious/2158.ps1
2158.ps1
function Write-LogEntry { param( [parameter(Mandatory=$true, HelpMessage="Value added to the RemovedApps.log file.")] [ValidateNotNullOrEmpty()] [string]$Value, [parameter(Mandatory=$false, HelpMessage="Name of the log file that the entry will written to.")] [ValidateNotNullOrEmpty()] [string]$FileName = "RemovedApps.log" ) $LogFilePath = Join-Path -Path $env:windir -ChildPath "Temp\$($FileName)" try { Add-Content -Value $Value -LiteralPath $LogFilePath -ErrorAction Stop } catch [System.Exception] { Write-Warning -Message "Unable to append log entry to RemovedApps.log file" } } Write-LogEntry -Value "Starting appx package removal" $AppArrayList = Get-AppxPackage -PackageTypeFilter Bundle -AllUsers | Select-Object -Property Name, PackageFullName | Sort-Object -Property Name $WhiteListedApps = @( "Microsoft.DesktopAppInstaller", "Microsoft.Messaging", "Microsoft.StorePurchaseApp" "Microsoft.WindowsCalculator", "Microsoft.WindowsCommunicationsApps", "Microsoft.WindowsSoundRecorder", "Microsoft.WindowsStore" ) foreach ($App in $AppArrayList) { if (($App.Name -in $WhiteListedApps)) { Write-LogEntry -Value "Skipping excluded application package: $($App.Name)" } else { $AppPackageFullName = Get-AppxPackage -Name $App.Name | Select-Object -ExpandProperty PackageFullName $AppProvisioningPackageName = Get-AppxProvisionedPackage -Online | Where-Object { $_.DisplayName -like $App.Name } | Select-Object -ExpandProperty PackageName try { Write-LogEntry -Value "Removing application package: $($AppPackageFullName)" Remove-AppxPackage -Package $AppPackageFullName -ErrorAction Stop } catch [System.Exception] { Write-Warning -Message $_.Exception.Message } if ($AppProvisioningPackageName -ne $null) { try { Write-LogEntry -Value "Removing application provisioning package: $($AppProvisioningPackageName)" Remove-AppxProvisionedPackage -PackageName $AppProvisioningPackageName -Online -ErrorAction Stop } catch [System.Exception] { Write-Warning -Message $_.Exception.Message } } } } Write-LogEntry -Value "Starting Features on Demand V2 removal" $WhiteListOnDemand = "NetFX3|Tools.Graphics.DirectX|Tools.DeveloperMode.Core|Language" $OnDemandFeatures = Get-WindowsCapability -Online | Where-Object { $_.Name -notmatch $WhiteListOnDemand -and $_.State -like "Installed"} | Select-Object -ExpandProperty Name foreach ($Feature in $OnDemandFeatures) { try { Write-LogEntry -Value "Removing feature on demand: $($Feature)" Get-WindowsCapability -Online -ErrorAction Stop | Where-Object { $_.Name -like $Feature } | Remove-WindowsCapability -Online -ErrorAction Stop } catch [System.Exception] { Write-Warning -Message $_.Exception.Message } }
combined_dataset/train/non-malicious/3196.ps1
3196.ps1
function Get-PropertyType { param ( [Parameter( Mandatory=$true, ValueFromPipeline=$true)] [psobject]$InputObject, [string[]]$property = $null ) Begin { Function Get-PropertyOrder { [cmdletbinding()] param( [Parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromRemainingArguments=$false)] [PSObject]$InputObject, [validateset("AliasProperty", "CodeProperty", "Property", "NoteProperty", "ScriptProperty", "Properties", "PropertySet", "Method", "CodeMethod", "ScriptMethod", "Methods", "ParameterizedProperty", "MemberSet", "Event", "Dynamic", "All")] [string[]]$MemberType = @( "NoteProperty", "Property", "ScriptProperty" ), [string[]]$ExcludeProperty = $null ) begin { if($PSBoundParameters.ContainsKey('inputObject')) { $firstObject = $InputObject[0] } } process{ $firstObject = $InputObject } end{ $firstObject.psobject.properties | Where-Object { $memberType -contains $_.memberType } | Select -ExpandProperty Name | Where-Object{ -not $excludeProperty -or $excludeProperty -notcontains $_ } } } $Output = @{} } Process { foreach($obj in $InputObject){ $props = @( Get-PropertyOrder -InputObject $obj | Where { -not $Property -or $property -contains $_ } ) foreach($prop in $props){ Try{ $type = $obj.$prop.gettype().FullName } Catch { $type = $null } if(-not $Output.ContainsKey($prop)){ $List = New-Object System.Collections.ArrayList [void]$List.Add($type) $Output.Add($prop, $List) } else{ if($Output[$prop] -notcontains $type){ [void]$output[$prop].Add($type) } } } } } End { $Output } }
combined_dataset/train/non-malicious/1165.ps1
1165.ps1
$iniPath = $null Describe 'Test-RemoveIniEntry' { BeforeAll { & (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve) } BeforeEach { $iniPath = Join-Path ([IO.Path]::GetTempPath()) ([IO.Path]::GetRandomFileName()) $null = New-Item $iniPath -ItemType File @' sectionless = value section1value1 = duplicate [section1] section1value1 = value2 unicodevalue = ���������� '@ | Set-Content -Path $iniPath $Global:Error.Clear() } AfterEach { Remove-Item $iniPath } function Assert-IniFile { param( [string] $ExpectedContents ) $expectedLines = @() if( $ExpectedContents ) { $expectedLines = $ExpectedContents -split "`r`n" } $iniPath | Should Exist $actualContents = @( Get-Content $iniPath ) $actualContents.Length | Should Be $expectedLines.Length for( $idx = 0; $idx -lt $actualContents.Length; ++$idx ) { $actualContents[$idx] | Should Be $expectedLines[$idx] } } It 'should not remove entry that does not exist' { $originalIniFile = ((Get-Content -Path $iniPath) -join "`r`n") Remove-IniEntry -Path $iniPath -Section section -Name empty $Error.Count | Should Be 0 Assert-IniFile $originalIniFile } It 'should support what if' { $Error.Clear() $originalIniFile = ((Get-Content -Path $iniPath) -join "`r`n") Remove-IniEntry -Path $iniPath -Section section1 -Name section1value1 -WhatIf $Error.Count | Should Be 0 Assert-IniFile $originalIniFile } It 'should remove sectionless entry' { Remove-IniEntry -Path $iniPath -Name section1value1 Assert-IniFile @' sectionless = value [section1] section1value1 = value2 unicodevalue = ���������� '@ } It 'should remove entry in section' { Remove-IniEntry -Path $iniPath -Name section1value1 -Section section1 Assert-IniFile @' sectionless = value section1value1 = duplicate [section1] unicodevalue = ���������� '@ } It 'should remove case sensitive ini options' { @' name = a NAME = b [section] name = c [SECTION] name = d '@ | Set-Content -Path $iniPath Remove-IniEntry -Path $iniPath -Name 'name' -CaseSensitive Remove-IniEntry -Path $iniPath -Section 'section' -Name 'name' -CaseSensitive $ini = Split-Ini -Path $iniPath -CaseSensitive -AsHashtable $ini | Should Not BeNullOrEmpty $ini.Count | Should Be 2 $ini['NAME'].Value | Should Be 'b' $ini['SECTION.name'].Value | Should Be 'd' } It 'should remove last entry from a file when it is the only line' { @' MyKey = a '@ | Set-Content -Path $iniPath Remove-IniEntry -Path $iniPath -Name 'MyKey' $ini = Split-Ini -Path $iniPath -AsHashtable $ini.Count | Should Be 0 } }
combined_dataset/train/non-malicious/Remove-Games.ps1
Remove-Games.ps1
#/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\ # # Script Name: Remove-Games.ps1 # Title: Remove Games # Version: 1.0 # Author: John W. Cannon <johnwcannon at_gmail_dot_com> # Date: September 20, 2011 # # Description: This tool removes the built-in games # from Windows XP (tested on SP3) # #/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\/\\ #Obtain processes and kill any running games $a = Get-Process #Get a list of running processes #Kill Freecell If ($a | Where-Object {$_.ProcessName -eq "freecell"}){ Stop-Process -name freecell -Force } #Kill Zone.com client If ($a | Where-Object {$_.ProcessName -eq "zClientm"}){ Stop-Process -name zClientm -Force } #Kill Hearts If ($a | Where-Object {$_.ProcessName -eq "mshearts"}){ Stop-Process -name mshearts -Force } #Kill Internet Backgammon If ($a | Where-Object {$_.ProcessName -eq "bckgzm"}){ Stop-Process -name bckgzm -Force } #Kill Internet Checkers If ($a | Where-Object {$_.ProcessName -eq "chkrzm"}){ Stop-Process -name chkrzm -Force } #Kill Internet Hearts If ($a | Where-Object {$_.ProcessName -eq "hrtzzm"}){ Stop-Process -name hrtzzm -Force } #Kill Internet Reversi If ($a | Where-Object {$_.ProcessName -eq "rvsezm"}){ Stop-Process -name rvsezm -Force } #Kill Internet Spades If ($a | Where-Object {$_.ProcessName -eq "shvlzm"}){ Stop-Process -name shvlzm -Force } #Kill Minesweeper If ($a | Where-Object {$_.ProcessName -eq "winmine"}){ Stop-Process -name winmine -Force } #Kill Pinball If ($a | Where-Object {$_.ProcessName -eq "pinball"}){ Stop-Process -name pinball -Force } #Kill Solitaire If ($a | Where-Object {$_.ProcessName -eq "sol"}){ Stop-Process -name sol -Force } #Kill Spider Solitaire If ($a | Where-Object {$_.ProcessName -eq "spider"}){ Stop-Process -name spider -Force } #Create the file needed for the sysocmgr.exe program $file = New-Item -ItemType file "c:\\Windows\\inf\\ocm.txt" -Force Add-Content $file "[Components]" Add-Content $file "freecell=off" Add-Content $file "hearts=off" Add-Content $file "minesweeper=off" Add-Content $file "msnexplr=off" Add-Content $file "pinball=off" Add-Content $file "solitaire=off" Add-Content $file "spider=off" Add-Content $file "zonegames=off" #Run the sysocmgr.exe utility with the file we just created #More information on sysocmgr.exe here: http://support.microsoft.com/kb/222444 Invoke-Expression "sysocmgr.exe /i:c:\\windows\\inf\\sysoc.inf /u:c:\\windows\\inf\\ocm.txt /q" #Remove the Games folder from the All Users profile because it isn't deleted by sysocmgr Remove-Item 'c:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Games' -Force -WarningAction SilentlyContinue -Recurse
combined_dataset/train/non-malicious/sample_50_80.ps1
sample_50_80.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.Support.private.dll') # Get the private module's instance $instance = [Microsoft.Azure.PowerShell.Cmdlets.Support.Module]::Instance # Export nothing to clear implicit exports Export-ModuleMember # Export proxy cmdlet scripts $exportsPath = $PSScriptRoot $directories = Get-ChildItem -Directory -Path $exportsPath $profileDirectory = $null if($instance.ProfileName) { if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) { $profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName } } else { # Don't export anything if the profile doesn't exist for the module $exportsPath = $null Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded." } } elseif(($directories | Measure-Object).Count -gt 0) { # Load the last folder if no profile is selected $profileDirectory = $directories | Select-Object -Last 1 } if($profileDirectory) { Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" $exportsPath = $profileDirectory.FullName } if($exportsPath) { Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias) } # endregion # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC2fZls2JpoOE1s # q5L+ivW6C0QVv2JCNn2pnAOHM9i6kaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJvk # ikN2m+Q/JxCo+5XXWxGz52ohWreInrYJw2/g3aM2MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAh/dRu2cOT/ZET3U9g9JUeSAZwiWUP0qXPwl0 # fe6TnDA3wtbDjAex68gYnpDIzYwQZnU9SUXWEUShtcvHiB3UyLp4RRt1YOvmLTVs # cVFK3hDu4o+1Sa7NAw1pIH+JHCti9fR+iItHfCavty1Hzz7qAJ+JVt1LRfQCarBq # Za3Wxo8ArhPRSRtJe+XG8zaf+dULFevbz/z+80bTdKZuq+aXB/WXQm/pUJijFdTY # U3LSI+gxn3QB4oLJDPjXBb0Kk48WZwZdBE0ynMyNugpzF+4aaki8DgCGZKdl6S4k # r30PZna996DJZN3SVLwCEi975/xUplfcu31/lDzxUbbXDBeWgaGCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCC2d4hGWredGNSTUXuGjqnH/Tk1tNGaMUFN # UObsRqAHPwIGZjOTMI8jGBMyMDI0MDUxNjA2NDIxMC42ODFaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwAB # AAAB6jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rW # b2ksqaF65QtJkbQpmsc6G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T # 0KfylTulrzKtgxnxZh7q1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGo # n/4VDHnZhdas22svSC5GHywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB # +KHCy08ds36an7IcOGfRmhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjA # lsBBHD1TdGBucrGC3TQXSTp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1f # xYk2nY6SCKsV+VmtV5aiPzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEU # TBPXME/ia+t8jrT2y3ug15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM # 3HPVJJ19vOSvrCP9lsEcEwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp # 081X5RQ6HGVUz6ZdgQ0jcT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc # 9KHKTWfXpAVj1Syqt5X4nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8 # HUVMp+mAA4rXjOw42vkHfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebp # F0BU1MTIcosFblleMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxV # bX3G37KgvyoNAnuu2w3HoWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI5 # 3kOWSaWCaV3xCznpRt3c4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqe # kZb4ivMR6LoPb5HNlq0WbBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8Cx # iAg2KlbPyMwBOPcr9hJT8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzE # GafPUwLmoETihOGLqIQlCpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3Qd # iNS8u9ujYh1B7NLr6t3IglfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2 # JG5BYu/XitRE8cdzaJmDVBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dix # UxE4qlfUPMixGr0Ft4/S0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi # 5auiqB6xQBADUf+F7hSKZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Q # bt45Cz/QMa7EmMGNn7a8MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5D # r5m3T4bDj9WTNLgP8SFe3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCJ2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/dJTAi # GA8yMDI0MDUxNjAxMTcyNVoYDzIwMjQwNTE3MDExNzI1WjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDp790lAgEAMAoCAQACAiY8AgH/MAcCAQACAhN/MAoCBQDp8S6l # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEhVGnVlLQhp31Br8gQI4Frz # Q3vgx9Hz7GvwwXnR7GaGUt443VjhqROBrxMxQAcaG7FEj9Ec75+06i7qsIn29zx0 # 9CxxDDhDGN2gDPFciLsEBiuURZx2G5F9uUGFDLtMdH7wD0O9iNBOy4u6pEX8Ip1I # kkkmbgAGeDW66AJ2vhivtKEdEy5eaL8estsNjCQ3L6A3hKgxoH2kApXhBX/zLQPT # 6H3lzouSfxjm3v3SXXHfiXrIxLwskfDd6kHcAiEHUrdKpYIpKCrcG9rtprvYW65J # qkZaE/mtxtCTO1jsw2op4gX0JsxTp0cnXjpgIHfNXUkclqhWpMH25ciLVUZGQFcx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AeqaJHLVWT9hYwABAAAB6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCDA7DrTzUOIOBbgpOEPzCO # dBYPvNxsLmgtP5ysIPFIzjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmP # odXjZDR4iwg0ltLANXBh5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgIbP0 # ZWY+r31SEk/v7RUAyrZJM1k6l1N9wsbSPOKyaUMwDQYJKoZIhvcNAQELBQAEggIA # kWC1/Q0SeNfg4MoYFA2Ax+sF5xGxbv8kwI7sXHzSFCpy3ppE5+2uUnBwtfi0tvIt # YsKK5ql5yT4nCagYV3h+dqPJD5J4f/uzEsAK8XjDUaW9vJfX5H7yES909ah0NPk2 # hQYHqHV1WGwDtnJhgnXbBoOVRqQ5nPUPILuZsE+FiY+M9q60efFkO5uwz0H2pLQZ # WQ30m28o+pR9nERd2/edNigauyX//ZT9Nzn8ffh4At/StCHgvTrbBpnMKJQTQBlB # l2OBckf4+gOliU76tIGBH28z0TJCSQXhsNzCAEOY1j7H0LAGurQgY3fzZmPsyOUT # 4KwSUy1fkCwQggFQrXAzkbZOJuxy/Qfql7vc5KIDm8wpK3q3rT6VbcREBVcYhhVF # EWLA6RYOfJWtQk1UBCALUGcS9yTLhekSRWwZXcieLVXUV2rCrBSZ9LxVKPUtSQ2z # qhcEO7X3gOYsJo34NjFQLOnSGpY5kBpu2/Pysq2U8UT2bKDOHBFIFR49vnffySeZ # WIHxDVjX/XISUDGvGItqE7oT4nmyXG2n/ry30OFCbp2bGQJoWBl62u35mDpL4urR # xaPbl2ZQyzoiyVkhdepe8QcNXTJy5eid61fm3oOjtHQFnracmwDQJdaNnTqC5DEx # l6YPfY2KOcV2kGDuckU/Nu7WCBI0ZZhtR8eaN0rRwv0= # SIG # End signature block
combined_dataset/train/non-malicious/2663.ps1
2663.ps1
[CmdletBinding()] Param ( ) [string]$appDeployToolkitExtName = 'PSAppDeployToolkitExt' [string]$appDeployExtScriptFriendlyName = 'App Deploy Toolkit Extensions' [version]$appDeployExtScriptVersion = [version]'3.8.0' [string]$appDeployExtScriptDate = '23/09/2019' [hashtable]$appDeployExtScriptParameters = $PSBoundParameters If ($scriptParentPath) { Write-Log -Message "Script [$($MyInvocation.MyCommand.Definition)] dot-source invoked by [$(((Get-Variable -Name MyInvocation).Value).ScriptName)]" -Source $appDeployToolkitExtName } Else { Write-Log -Message "Script [$($MyInvocation.MyCommand.Definition)] invoked directly" -Source $appDeployToolkitExtName }
combined_dataset/train/non-malicious/sample_40_27.ps1
sample_40_27.ps1
# # Module manifest for module 'OCI.PSModules.Integration' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Integration.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '5ec25c15-0aff-44af-9aaa-8441460571eb' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Integration Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Integration.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCIIntegrationProcessAutomation', 'Get-OCIIntegrationInstance', 'Get-OCIIntegrationInstancesList', 'Get-OCIIntegrationWorkRequest', 'Get-OCIIntegrationWorkRequestErrorsList', 'Get-OCIIntegrationWorkRequestLogsList', 'Get-OCIIntegrationWorkRequestsList', 'Move-OCIIntegrationInstanceCompartment', 'Move-OCIIntegrationInstanceNetworkEndpoint', 'Move-OCIIntegrationPrivateEndpointOutboundConnection', 'New-OCIIntegrationInstance', 'Remove-OCIIntegrationInstance', 'Start-OCIIntegrationInstance', 'Stop-OCIIntegrationInstance', 'Update-OCIIntegrationInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Integration' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Download Free Reflector.ps1
Download Free Reflector.ps1
#Thanks http://27.am/posts/how-to-download-net-reflector-6-for-free add-type @' using System; using System.Diagnostics; using System.IO; using System.Net; using System.Reflection; namespace LookingGlass { 젨젨public class RedGateDownloader 젨젨젨젨public static void Download() 젨젨젨젨{ 젨젨젨젨젨젨QueryDownloadUrl("http://reflector.red-gate.com/Reflector.version"); 젨젨젨젨} 젨젨젨젨static void QueryDownloadUrl(string versionUrl) 젨젨젨젨{ 젨젨젨젨젨젨Console.WriteLine("Phase 1: Getting download URL..."); 젨젨젨젨젨젨HttpWebRequest request = GetHttpWebRequest(versionUrl); 젨젨젨젨젨젨string downloadUrl = null; 젨젨젨젨젨젨string data; 젨젨젨젨젨젨using (WebResponse response = request.GetResponse()) 젨젨젨젨젨젨{ 젨젨젨젨젨젨젨젨data = ReadResponse(response); 젨젨젨젨젨젨젨젨foreach (string line in data.Split('\\n')) 젨젨젨젨젨젨젨젨{ 젨젨젨젨젨젨젨젨젨젨if (line.StartsWith("http", StringComparison.OrdinalIgnoreCase)) 젨젨젨젨젨젨젨젨젨젨{ 젨젨젨젨젨젨젨젨젨젨젨젨// If this version number stops working, search for other known .NET Reflector version numbers; Red Gates own forums mention a few 젨젨젨젨젨젨젨젨젨젨젨젨downloadUrl = line.Trim('\\r').Replace("{Client}", "Reflector").Replace("{Version}", "6.1.0.11"); 젨젨젨젨젨젨젨젨젨젨젨젨break; 젨젨젨젨젨젨젨젨젨젨} 젨젨젨젨젨젨젨젨} 젨젨젨젨젨젨} 젨젨젨젨젨젨if (downloadUrl == null) 젨젨젨젨젨젨{ 젨젨젨젨젨젨젨젨Console.WriteLine("Failed to find download URL. Returned data was:"); 젨젨젨젨젨젨젨젨Console.WriteLine(data); 젨젨젨젨젨젨젨젨Console.ReadLine(); 젨젨젨젨젨젨} 젨젨젨젨젨젨else 젨젨젨젨젨젨{ 젨젨젨젨젨젨젨젨Console.WriteLine("Launching download process... for "+downloadUrl); 젨젨젨젨젨젨젨젨Process.Start(Process.GetCurrentProcess().MainModule.FileName, downloadUrl); 젨젨젨젨젨젨젨젨Console.WriteLine("Phase 1 complete."); Console.ReadLine(); Download(downloadUrl); 젨젨젨젨젨젨} 젨젨젨젨} 젨젨젨젨static void Download(string downloadUrl) 젨젨젨젨{ 젨젨젨젨젨젨Console.WriteLine("Phase 2: Downloading..."); 젨젨젨젨젨젨HttpWebRequest request = GetHttpWebRequest(downloadUrl); 젨젨젨젨젨젨string path; 젨젨젨젨젨젨using (HttpWebResponse response = (HttpWebResponse)request.GetResponse()) 젨젨젨젨젨젨{ 젨젨젨젨젨젨젨젨path = GetDownloadFilename(response); 젨젨젨젨젨젨젨젨if (response.StatusCode == HttpStatusCode.OK && !string.IsNullOrEmpty(path)) 젨젨젨젨젨젨젨젨{ 젨젨젨젨젨젨젨젨젨젨Console.WriteLine("Saving to {0}...", path); 젨젨젨젨젨젨젨젨젨젨SaveResponse(response, path); 젨젨젨젨젨젨젨젨젨젨Console.WriteLine("Done!"); 젨젨젨젨젨젨젨젨} 젨젨젨젨젨젨젨젨else 젨젨젨젨젨젨젨젨{ 젨젨젨젨젨젨젨젨젨젨Console.WriteLine("Download failed; server returned status code {0}. Returned data was:", response.StatusCode); 젨젨젨젨젨젨젨젨젨젨Console.WriteLine(ReadResponse(response)); 젨젨젨젨젨젨젨젨젨젨Console.ReadLine(); 젨젨젨젨젨젨젨젨} 젨젨젨젨젨젨} 젨젨젨젨} 젨젨젨젨static HttpWebRequest GetHttpWebRequest(string url) 젨젨젨젨{ 젨젨젨젨젨젨HttpWebRequest request = (HttpWebRequest)WebRequest.Create(url); 젨젨젨젨젨젨request.Headers.Add("Cache-Control: no-cache, no-store, max-age=0"); 젨젨젨젨젨젨// Emulate the manner in which the headers are handled 젨젨젨젨젨젨FieldInfo usesProxySemantics = typeof(ServicePoint).GetField("m_ProxyServicePoint", BindingFlags.NonPublic | BindingFlags.Instance); 젨젨젨젨젨젨usesProxySemantics.SetValue(request.ServicePoint, true); 젨젨젨젨젨젨return request; 젨젨젨젨} 젨젨젨젨static string GetDownloadFilename(HttpWebResponse response) 젨젨젨젨{ 젨젨젨젨젨젨string contentDisposition = response.Headers["content-disposition"]; 젨젨젨젨젨젨if (string.IsNullOrEmpty(contentDisposition)) 젨젨젨젨젨젨젨젨return null; 젨젨젨젨젨젨string filenameField = "filename="; 젨젨젨젨젨젨int index = contentDisposition.IndexOf(filenameField, StringComparison.CurrentCultureIgnoreCase); 젨젨젨젨젨젨if (index < 0) 젨젨젨젨젨젨젨젨return null; 젨젨젨젨젨젨return contentDisposition.Substring(index + filenameField.Length).Trim('"'); 젨젨젨젨} 젨젨젨젨static string ReadResponse(WebResponse response) 젨젨젨젨{ 젨젨젨젨젨젨using (Stream netStream = response.GetResponseStream()) 젨젨젨젨젨젨{ 젨젨젨젨젨젨젨젨using (StreamReader reader = new StreamReader(netStream)) 젨젨젨젨젨젨젨젨{ 젨젨젨젨젨젨젨젨젨젨return reader.ReadToEnd(); 젨젨젨젨젨젨젨젨} 젨젨젨젨젨젨} 젨젨젨젨} 젨젨젨젨static void SaveResponse(WebResponse response, string path) 젨젨젨젨{ 젨젨젨젨젨젨byte[] buffer = new byte[4 * 1024]; 젨젨젨젨젨젨int bytesRead; 젨젨젨젨젨젨using (Stream netStream = response.GetResponseStream()) 젨젨젨젨젨젨{ 젨젨젨젨젨젨젨젨if (File.Exists(path)) 젨젨젨젨젨젨젨젨젨젨File.Delete(path); 젨젨젨젨젨젨젨젨using (FileStream fileStream = File.Create(path)) 젨젨젨젨젨젨젨젨{ 젨젨젨젨젨젨젨젨젨젨while ((bytesRead = netStream.Read(buffer, 0, buffer.Length)) > 0) 젨젨젨젨젨젨젨젨젨젨{ 젨젨젨젨젨젨젨젨젨젨젨젨Console.Write("."); 젨젨젨젨젨젨젨젨젨젨젨젨fileStream.Write(buffer, 0, bytesRead); 젨젨젨젨젨젨젨젨젨젨} 젨젨젨젨젨젨젨젨} 젨젨젨젨젨젨} 젨젨젨젨젨젨Console.WriteLine(); 젨젨젨젨} 젨젨} } '@ [LookingGlass.RedGateDownloader]::Download()
combined_dataset/train/non-malicious/sample_54_99.ps1
sample_54_99.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ param ( [Parameter(Mandatory=$false)] [switch] $KeepFabricData, [Parameter(Mandatory=$false)] [string] $LogPath, [Parameter(Mandatory=$false)] [string] $FabricDataRoot ) function DeletePath([string] $pathToDelete) { if (([string]::IsNullOrEmpty($pathToDelete)) -or (!(Test-Path $pathToDelete))) { return } Write-Host "Deleting $pathToDelete" Remove-Item $pathToDelete -Recurse -Force 2> $null if (Test-Path $pathToDelete) { Write-Warning "$pathToDelete still exists. Delete manually." } } $Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity) $IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator) if (!$IsAdmin) { Write-Host "Please run the script with administrative privileges." -ForegroundColor "Red" exit 1 } # Get registry keys $FabricRegKeyPath = "HKLM:\SOFTWARE\Microsoft\Service Fabric" Get-ItemProperty -Path $FabricRegKeyPath -ErrorAction Ignore | Out-Null if ($?) { $FabricRoot = (Get-ItemProperty -Path $FabricRegKeyPath -Name "FabricRoot").FabricRoot $FabricCodePath = (Get-ItemProperty -Path $FabricRegKeyPath -Name "FabricCodePath").FabricCodePath $FabricDataRoot = (Get-ItemProperty -Path $FabricRegKeyPath -Name "FabricDataRoot").FabricDataRoot $FabricBinRoot = (Get-ItemProperty -Path $FabricRegKeyPath -Name "FabricBinRoot").FabricBinRoot } else { Write-Host "Registry key is already removed." } $gacDirectories = @( "$env:SystemRoot\Microsoft.NET\assembly\GAC_64\System.Fabric", "$env:SystemRoot\Microsoft.NET\assembly\GAC_64\System.Fabric.Strings", "$env:SystemRoot\Microsoft.NET\assembly\GAC_MSIL\System.Fabric.Management.ServiceModel", "$env:SystemRoot\Microsoft.NET\assembly\GAC_MSIL\System.Fabric.Strings" ) # Stop services Get-Service FabricHostSvc -ErrorAction Ignore | Out-Null if ($?) { Write-Host "Stopping FabricHostSvc." Stop-Service FabricHostSvc } else { Write-Host "FabricHostSvc is already removed." } Get-Service FabricInstallerSvc -ErrorAction Ignore | Out-Null if ($?) { Write-Host "Stopping FabricInstallerSvc." Stop-Service FabricInstallerSvc } else { $FabricInstallerSvcAbsent = $true Write-Host "FabricInstallerSvc is already removed." } # Try determine file locations if registry key deleted if (!(Test-Path variable:FabricRoot) ` -or [string]::IsNullOrEmpty($FabricRoot) ` -or !(Test-Path $FabricRoot)) { $AttemptedFabricRootPath = Join-Path $env:ProgramFiles "Microsoft Service Fabric" if (Test-Path $AttemptedFabricRootPath) { Write-Host "FabricRoot autodetermined at '$AttemptedFabricRootPath'." $FabricRoot = $AttemptedFabricRootPath $AttemptedFabricCodePath = Join-Path $FabricRoot "bin\Fabric\Fabric.Code" if (Test-Path $AttemptedFabricCodePath) { Write-Host "FabricCodePath autodetermined at '$AttemptedFabricCodePath'." $FabricCodePath = $AttemptedFabricCodePath } else { Write-Host "FabricCodePath not present." } } else { Write-Host "FabricRoot not present." } } if ([string]::IsNullOrEmpty($LogPath)) { $LogPath = Join-Path $env:TEMP -ChildPath "FabricSetupLog.Uninstall.log" } # Uninstall Fabric if ((Test-Path variable:FabricCodePath) ` -and ![string]::IsNullOrEmpty($FabricCodePath)) { $fabricSetupPath = Join-Path $FabricCodePath -ChildPath "FabricSetup.exe" if (Test-Path $fabricSetupPath) { $arguments = "/operation:uninstall" if ($KeepFabricData.IsPresent) { $arguments += " /deleteData:false"; } Write-Host "FabricSetup uninstall running..." $command = "`"$fabricSetupPath`" $arguments && exit 0 || exit 1" $setupOutput = cmd.exe /c $command > "$LogPath" if ($LASTEXITCODE -eq 1) { Write-Error "FabricSetup ran into an issue. Find log at $LogPath." if ($setupOutput -is [System.Array]) { $setupOutput = $setupOutput | Out-String } Write-Error $setupOutput } else { Write-Host "FabricSetup uninstall Completed. Find log at $LogPath." } } else { Write-Host "FabricSetup.exe is no longer in FabricCodePath. Uninstall may have already run." } } else { Write-Host "Fabric is already uninstalled." } if (!(Test-Path variable:FabricInstallerSvcAbsent) ` -or !$FabricInstallerSvcAbsent) { Get-Service FabricInstallerSvc -ErrorAction Ignore | Out-Null if ($?) { Write-Host "Deleting FabricInstallerSvc" $service = Get-WmiObject -Class Win32_Service -Filter "Name='FabricInstallerSvc'" $service.delete() | Out-Null Get-Service FabricInstallerSvc -ErrorAction Ignore | Out-Null if ($?) { Write-Warning "FabricInstallerSvc is still present. May need to reboot to complete uninstallation." } } else { Write-Host "FabricInstallerSvc is already removed." } } # Delete cluster data & bits if ((Test-Path variable:FabricDataRoot) ` -and (!$KeepFabricData.IsPresent)) { DeletePath($FabricDataRoot) } if (Test-Path variable:FabricBinRoot) { DeletePath($FabricBinRoot) } if (Test-Path variable:FabricRoot) { DeletePath($FabricRoot) } foreach ($gacDirectory in $gacDirectories) { DeletePath($gacDirectory) } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDGxr3nS3N8GQF+ # XH1ApgppgVuwoWyOxB+AQBJ52EpooaCCDXYwggX0MIID3KADAgECAhMzAAADTrU8 # esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU # p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1 # 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm # WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa # +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq # jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk # mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31 # TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2 # kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d # hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM # pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh # JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX # UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir # IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8 # 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A # Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H # tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPafaxS0meyHyGv8CYqifvdv # zTOFuUDbfJYMAs2IIO2QMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAPYHXGDaBICRt/tGvI3HSa4z5hUlMxzHS6m3yrE+2sKS+cU5CDbmNDLLl # HFIEoXUYAJ45/W0rTFZYzNv1zPPdCGS6kdR1hpQCtyy1qd/Y98lQsE6QgITIgxHB # TbSxG/sEbv1hvjQzcP+yhU/Oh03SUAA5f29PR/F/ixY2XS11V/GLOGJMDr3nzIcd # n284akzZglulbfQqbl1md50wUSNR4kcSqhdt1wwgTvDBpyOeCVjT39TjF7Cx5S7m # J3GXia61f+QX8VZK+TG9gKT8gahqELECf3ih8SEYxORysLb2crI5wb++3EZuTsWR # nbuguRjPjt0uHET1JYXJaHVvq2jPXqGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCApXvi/qSuCavntbHP0wc8jpH72FvtTBTlyPVcPcpm0owIGZGzyB1px # GBMyMDIzMDUzMTIxMzM0Ni4xNjJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAG59gANZVRPvAMAAQAAAbkwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjIw # OTIwMjAyMjE3WhcNMjMxMjE0MjAyMjE3WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAONJPslh9RbHyQECbUIINxMF # 5uQkyN07VIShITXubLpWnANgBCLvCcJl7o/2HHORnsRcmSINJ/qclAmLIrOjnYnr # bocAnixiMEXC+a1sZ84qxYWtEVY7VYw0LCczY+86U/8shgxqsaezKpWriPOcpV1S # h8SsOxf30yO7jvld/IBA3T6lHM2pT/HRjWk/r9uyx0Q4atx0mkLVYS9y55/oTlKL # E00h792S+maadAdy3VgTweiwoEOXD785wv3h+fwH/wTQtC9lhAxhMO4p+OP9888W # xkbl6BqRWXud54RTzqp2Vr+yen1Q1A6umyMB7Xq0snIYG5B1Acc4UgJlPQ/ZiMkq # gxQNFCWQvz0G9oLgSPD8Ky0AkX22PcDOboPuNT4RceWPX0UVZUsX9IUgs7QF41Hi # QSwEeOOHGyrfQdmSslATrbmH/18M5QrsTM5JINjct9G42xqN8VF9Z8WOiGMjNbvl # pcEmmysYl5QyhrEDoFnQTU7bFrD3JX0fIfu1sbLWeBqXwbp4Z8yACTtphK2VbzOv # i4vc0RCmRNzvYQQ2PjZ7NaTXE4Gu3vggAJ+rtzUTAfJotvOSqcMgNwLZa1Y+ET/l # b0VyjrYwFuHtg0QWyQjP5350LTpv086pyVUh4A3w/Os5hTGFZgFe5bCyMnpY09M0 # yPdHaQ/56oYUsSIcyKyVAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUt7A4cdtYQ5oJ # jE1ZqrSonp41RFIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAM3cZ7NFUHRMsLKz # jl7rJPIkv7oJ+s9kkut0hZif9WSt60SzYGULp1zmdPqc+w8eHTkhqX0GKCp2TTqS # zBXBhwHOm8+p6hUxNlDewGMZUos952aTXblAT3OKBnfVBLQyUavrSjuJGZAW30cN # Y3rjVDUlGD+VygQHySaDaviJQbK6/6fQvUUFoqIk3ldGfjnAtnebsVlqh6WWamVc # 5AZdpWR1jSzN/oxKYqc1BG4SxxlPtcfrAdBz/cU4bxVXqAAf02NZscvJNpRnOALf # 5kVo2HupJXCsk9TzP5PNW2sTS3TmwhIQmPxr0E0UqOojUrBJUOhbITAxcnSa/IMl # uL1HXRtLQZI+xs2eRtuPOUsKUW71/1YeqsYCLHLvu82ceDVQQvP7GHEEkp2kEjio # fbjYErBo2iCEaxxeX4Z9HvAgA4MsQkbn6e4EFQf13sP+Kn3XgMIvJbqLJeFcQja+ # SUeOXu5cfkxe0GzTNojdyIwzaHlhOflVRZNrxee3B+yZwd3JHDIvv71uSI/SIzzt # 9cU2GyHQVqxBSrRtKW6W8Vw7zpVvoVsIv3ljxg+7NiGSlXX1s7zbBNDMUj9OnzOl # HK/3mrOU8YEuRf6RwakW5UCeGamy5MiKu2YuyKiGBCv4OGhPstNe7ALkEOh8BX12 # t4ntuYu+gw9L6yCPY0jWYaQtzAP9MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAx2IeGHhk58MQkzzSWknGcLjfgTqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOgh/CEwIhgPMjAyMzA2MDEwMTAyMjVaGA8yMDIzMDYwMjAxMDIyNVowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6CH8IQIBADAKAgEAAgIRwwIB/zAHAgEAAgIT1DAK # AgUA6CNNoQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFqaTo3wLRikPh1I # XSNRRaV8DR5FE4NzF/Or4m8OnJD6fJqZ98rr2wAvokdG6ZXrjX6ddJSDbMXAY8T/ # 7Wj7HcW8tVf/6u8j7hM/1p3nfbT+dEk0lngUDNjcFg72eEQppmxnjCCF2rmZcqsK # 6vD+83nkIivRqadNwvRZVPRtCKNcMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAG59gANZVRPvAMAAQAAAbkwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgpcfh8y1fE7GiWVBHlYUhUAYX359pQmaRv1MQf0eurR0wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCBk60bO8W85uTAfJVEO3vX2aLaQFcgcGpdwsOoi # +foP9DCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # ufYADWVUT7wDAAEAAAG5MCIEIM0YIDoOino8BDgpnWQJtKqOctR3NoXJ423vTfLl # HeCqMA0GCSqGSIb3DQEBCwUABIICACe+jlHIGkLG4iFQxeluPEzPYHG2z0ECq9vG # dST9AaP0tt35ojlvBk13BjNSXvJg5h0VFr1uTSUWVg2qcTcO7ijjuIRTMnhf3boA # zM39/dbOclQEgCxPKOzAtRPxaSXvi8Sm1W+bKgzOmif3CyLbw24uZB3/k0Sy8jC1 # MRhFxgVGAG1z2vzSFUaf7x2ee0WKeb4JebKxmlXAyQkdcRuICvv37SKQeWm0Tnmn # zUo/wSpmswUFtSBaiaS6X7gBYFsdMtP+imzhPdoMg7ABzc+ixBEA839JtxtxSh0s # iJBbiAuIioG9y5bjLVAD2AWfy0O/7Ppb0uclgikjPFxa5BcFWyDrJeow+aILhSP6 # +vgcCnRGQanVlu9IekfEY3A3n5bPD19TbXD/ED1+jm9gyNdqQd4+KkjWl997ZaS+ # vEkp9PpkC0winYW3Pj8j1BSF2+nX7kcR/sDuaQ4Wli9fi3KWIM2lAc2c8qPY05Ou # EZ/2EMsX8qkuBgrEL6tb/REV6fATym6AfztUIZ3ad8f/scVCfAxLLgfKcKVcTB0A # JFdPrsM9/e1xOUR9YK7t580P2G0Njpx6NbxaAe/zwDeaPII/ji5EJcZbUjHdyelA # Ax4Yxh/PDJBt9faBlgUzOAk5wOoX01xeY4z6A1gxm0zKKzryPlDIIyYUdkcGWv5q # 7lT4/764 # SIG # End signature block
combined_dataset/train/non-malicious/Dell Order Status.ps1
Dell Order Status.ps1
# Version: 0.1 # Author: Stefan Stranger # Description: Retrieve Dell Order Status # Start Page Order Status USA: https://support.dell.com/support/order/status.aspx?c=us&cs=19&l=en&s=dhs&~ck=pn # Start Page Order Status EMEA(nl): http://support.euro.dell.com/support/index.aspx?c=nl&l=nl&s=gen&~ck=bt # Example Dell Order Status URL: http://support.euro.dell.com/support/order/emea/OrderStatus.aspx?c=nl&l=nl&s=gen&ir=[IR Number]&ea=[emailaddress]' #param ([string]$url = $(read-host "Please enter Dell Order Status URL")) $wc = New-Object System.Net.WebClient $url = 'http://support.euro.dell.com/support/order/emea/OrderStatus.aspx?c=nl&l=nl&s=gen&ir=NL0131-8510-29070&ea=stefan.stranger@getronics.com' $RawResult = $wc.DownloadString($url) # $RawResult = gc orderstatus.txt # Search for the Estimated Delivery Date in the url that starts with the word "lever" (Levering is the Dutch word for Delivery" and # and ends with </B></TD></TR> # You should probable need to change the string "Lever" in "Deliv" or something $r = New-Object regex('Lever.*?(\\d+-\\d+-\\d{4})</B></TD></TR>','SingleLine' ) # String block with the Estimated Delivery Date $m = $r.Matches($RawResult) # Extract Delivery Date from string block $date = ($m |% {$_.groups[1].value }) # Search for Current Order Status ("In preproduction" is Dutch for "In preproduction" $r = New-Object regex('target="popup:640x480">(.*?)</a>' ) $m = $r.Matches($RawResult) $status = ($m |% {$_.groups[1].value }) $Orderstatus = 1 | select @{name='Status';expression={$status[0]}},@{name='Estimated Delivery Date';expression={$date}} $Orderstatus | ft -a #[string]$output = $orderstatus $startdate = "16-09-2007" $startdate $currentdate = (get-date).ToString('MM-dd-yyyy') $currentdate $date
combined_dataset/train/non-malicious/2239.ps1
2239.ps1
Begin { if ([int](Get-WmiObject -Class Win32_OperatingSystem).BuildNumber -lt 14393) { Write-Warning -Message "Unsupported build of Windows 10 detected, exiting" ; exit 1 } try { $TSEnvironment = New-Object -ComObject Microsoft.SMS.TSEnvironment -ErrorAction Stop } catch [System.Exception] { Write-Warning -Message "Unable to construct Microsoft.SMS.TSEnvironment object" ; exit 1 } } Process { function Write-CMLogEntry { param( [parameter(Mandatory=$true, HelpMessage="Value added to the smsts.log file.")] [ValidateNotNullOrEmpty()] [string]$Value, [parameter(Mandatory=$true, HelpMessage="Severity for the log entry. 1 for Informational, 2 for Warning and 3 for Error.")] [ValidateNotNullOrEmpty()] [ValidateSet("1", "2", "3")] [string]$Severity, [parameter(Mandatory=$false, HelpMessage="Name of the log file that the entry will written to.")] [ValidateNotNullOrEmpty()] [string]$FileName = "EnableUbuntuforWindows.log" ) $LogFilePath = Join-Path -Path $Script:TSEnvironment.Value("_SMSTSLogPath") -ChildPath $FileName $Time = -join @((Get-Date -Format "HH:mm:ss.fff"), "+", (Get-WmiObject -Class Win32_TimeZone | Select-Object -ExpandProperty Bias)) $Date = (Get-Date -Format "MM-dd-yyyy") $Context = $([System.Security.Principal.WindowsIdentity]::GetCurrent().Name) $LogText = "<![LOG[$($Value)]LOG]!><time=""$($Time)"" date=""$($Date)"" component=""EnableUbuntuForWindows"" context=""$($Context)"" type=""$($Severity)"" thread=""$($PID)"" file="""">" try { Add-Content -Value $LogText -LiteralPath $LogFilePath -ErrorAction Stop } catch [System.Exception] { Write-Warning -Message "Unable to append log entry to EnableUbuntuforWindows.log file" } } Write-CMLogEntry -Value "Starting configuration for Windows Subsystem for Linux" -Severity 1 $RegistryKeyPath = "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock" if (-not(Test-Path -Path $RegistryKeyPath)) { Write-CMLogEntry -Value "Creating HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock registry key" -Severity 1 New-Item -Path $RegistryKeyPath -ItemType Directory -Force } Write-CMLogEntry -Value "Adding HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock\AllowDevelopmentWithoutDevLicense value as DWORD with data 1" -Severity 1 New-ItemProperty -Path $RegistryKeyPath -Name AllowDevelopmentWithoutDevLicense -PropertyType DWORD -Value 1 try { Enable-WindowsOptionalFeature -FeatureName Microsoft-Windows-Subsystem-Linux -Online -All -LimitAccess -NoRestart -ErrorAction Stop Write-CMLogEntry -Value "Successfully enabled Microsoft-Windows-Subsystem-Linux feature" -Severity 1 } catch [System.Exception] { Write-CMLogEntry -Value "An error occured when enabling Microsoft-Windows-Subsystem-Linux feature, see DISM log for more information" -Severity 3 } }
combined_dataset/train/non-malicious/Deleted-ObjectsAD_1.ps1
Deleted-ObjectsAD_1.ps1
param( $Domen, $ObjectsDeleted ) function Ping ($Name){ $ping = new-object System.Net.NetworkInformation.Ping if ($ping.send($Name).Status -eq "Success") {$True} else {$False} trap {Write-Verbose "Error Ping"; $False; continue} } [string[]]$ObjectPath [string[]]$Disks [string[]]$Info [string[]]$Computers $Computers = Get-QADComputer -Service $Domen -OSName '*XP*','*Vista*','*7*' -SizeLimit 0 -ErrorAction SilentlyContinue | Select-Object name -ExpandProperty name foreach ($Computer in $Computers){ $Alive = Ping $Computer if ($Alive -eq "True"){ Write-Host "Seach $Computer" -BackgroundColor Blue trap {Write-Host "Error WmiObject $Computer";Continue} $Disks += Get-WmiObject win32_logicaldisk -ComputerName $Computer -ErrorAction SilentlyContinue | Where-Object {$_.Size -ne $null} if ($Disks){ foreach ($Disk in $Disks){ if ($Disk.Name -like "*:*") { $Disk = $Disk.Name.Replace(":","$") } trap {Write-Host "Error ChildItem $Computer";Continue} $ObjectPath += Get-ChildItem "\\\\$Computer\\$Disk\\*" -Recurse -ErrorAction SilentlyContinue if ($ObjectPath){ foreach ($Object in $ObjectsDeleted){ $ObjectPath | Where-Object {$_.Name -like $Object} | % { $Path = $_.FullName; Remove-Item $_.FullName -Recurse -Force -ErrorAction SilentlyContinue; $Info += "" | Select-Object @{e={$Path};n='Path'},` @{e={"Delete"};n='Action'} } } } } } } } $Info | Format-Table -AutoSize -ErrorAction SilentlyContinue
combined_dataset/train/non-malicious/disabled AD accounts_1.ps1
disabled AD accounts_1.ps1
#Get Domain List $objForest = [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest() $DomainList = @($objForest.Domains | Select-Object Name) $Domains = $DomainList | foreach {$_.Name} #get users list $users = Get-Content U:\\EMCU15FI3_USER.txt $total = $users.count "SAMaccountname;DisplayName;HomeDir;Domain" | Out-File -FilePath test.txt foreach($Domain in $Domains){ $i=0 foreach($user in $users) { # serializevalue parameter is used to inly get the properties needed so variable doesn't use too much RAM. $b = Get-QADUser -SamAccountName $user -SizeLimit 0 -Disabled -DontUseDefaultIncludedProperties -IncludedProperties NTAccountName, DisplayName, HomeDirectory, userprincipalname -SerializeValues $storing = $b.sAMAccountName + ";" + $b.displayName + ";" + $b.homeDirectory + ";" +$domain if ($storing.StartsWith(";")) { } else{ $storing | Out-File -FilePath test.txt -append } $storing=$null $b=$null #free up the garbage collect (empties unused variables) [System.GC]::Collect() $i++; Write-Progress -Activity "Searching disabled accounts in $domain" -Status "Progress:" -PercentComplete $($i*100/$total) } }
combined_dataset/train/non-malicious/sample_28_72.ps1
sample_28_72.ps1
[CmdletBinding()] param ( [Parameter(ParameterSetName="BackInTime")] [system.int32]$DaysSince = 1, [Parameter(ParameterSetName="DateRange")] [DateTime]$StartDate, [Parameter(ParameterSetName="DateRange")] [DateTime]$EndDate ) $ARM_NS_API_Regex = "(?mi)(?<path>(?<apipath>(?<NSpath>specification[/\\]([^\\/]+[\\/])+resource-manager[\\/]([^\\/]+[\\/])*(?<namespace>[^\d\\/]+\.[^\d\\/]+))[/\\]([^\\/]+[/\\])+(?<version>\d{4}-\d{2}-\d{2}(-(private)?preview)?)))" $since = (get-date).AddDays(-1 * $DaysSince) $updated = @() $date = "$($since.Year)/$($since.Month)/$($since.Day)" $commit = "" $regexString = "(?mi)^(?<sha>[a-z0-9]{40})(\s+(?<date>.+))*" if ($PSCmdlet.ParameterSetName -eq "BackInTime") { $updated = $(git log --diff-filter=ARMD --name-status --after="$date" --format="%H %cD") } else { $s_date = "$($startdate.Year)/$($startdate.Month)/$($startdate.Day)" $e_date = "$($enddate.Year)/$($enddate.Month)/$($enddate.Day)" $updated = $(git log --diff-filter=ARMD --name-status --after="$s_date" --before="$e_date" --format="%H %cD") } $results = $updated | ForEach-Object { if ($_ -match $regexString) { $commit = $matches.sha $date = Get-Date $matches.date } elseif ($_ -match "(?mi)^(?<mode>[MRAD])\s+(?<filename>[^ \t]+)([ \t]+(?<new>.+))*") { try { $tmp = [pscustomobject]@{ Mode = $matches.mode; FullName = $matches.filename PreviousFileName = "" Sha = $commit Date = $date } if ($tmp.Mode -eq "R") { $tmp.PreviousFileName = $tmp.FileName $tmp.FileName = $tmp.New } $tmp } catch { } } } $results = $results | Microsoft.PowerShell.Core\Where-Object {$_.FullName -match ".json" -or $_.New -match ".json"} $results = $results |Microsoft.PowerShell.Core\Where-Object {$_.FullName -notmatch "examples"} $results = $results | Microsoft.PowerShell.Core\ForEach-Object { if ($_.FullName -match $ARM_NS_API_Regex) { [pscustomobject]@{ Mode = $_.mode; FullName = $_.FullName PreviousFileName = $_.PreviousFileName Sha = $_.sha Date = $_.date } } } $results | ConvertTo-Json # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD1N0kbSXgUgZjg # ebnY/hJHkj56F2N00DqccFbpkS9CZqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIF5FzsgZq781jPSRdzMYHqS2 # 3KwDjSn4JfmevQZWB/ZhMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEALKYXVMMAjfGsUoQddkJZjM5NOyM+hqBvs2Tf4dwoA+2wsnoMxdprqgJV # 5Z2domuQ6kmGvNF9nZIVWHdEnfMsHkVAPFwANdvKNh2RmjuoJhvtxlYmKVtQ6N8H # pRdolwH2vCP0HznQMbVhsi9fXajgw6fiGjjOohHDUvudAupw2ieZee6fXgDiFWVE # asVDqDCCLUKOy5J6oiUPGiK6OUtSHSBqCEx2Pi1DauWgca9dbZE28pb3NlyfAh/S # 3Msln0VKbEVrSOliV85AToW5XtxLaso8dHhcvjF/e/gBErPOkmlLHwfc3uBqDAXB # /LpHJg9Ho2hFULtgkjHLik7GrUAzq6GCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCClj+t4rpDKKRJreP+rISIHZrBsrB0ZS/9figHHFFWrGQIGZdX7wA4P # GBMyMDI0MDIyMjE4NTc0My42NjlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOmBy34wIhgPMjAyNDAyMjIyMTMyNDZaGA8yMDI0MDIyMzIxMzI0NlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6YHLfgIBADAKAgEAAgIRSwIB/zAHAgEAAgIR2zAK # AgUA6YMc/gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJvBBMA5ai7Z+UO/ # zymDse3P7lCOhXWj1JxhUfv//cBwLu60QlPDdZUbwBAuNTHD2E50NND6QfOd8lNB # 8FpjUO3CK8TR67vfZFSJe8U+RdPYKu2bz/4i6noOiAov6NSrc9d+rmsk3A0mmYkM # uIYb55+9QzaMJgMsGoo7zTWTEt5bMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg8OcNGkXsKOLsxU4/Pzt9NenD00yi4lmpweJXRLziwD0wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH # 9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 5Y9qwPM9tAujAAEAAAHlMCIEIL7fbM4gzPMBLFxpC97e81I6i1kf2GHmjt+ZJos9 # ecOqMA0GCSqGSIb3DQEBCwUABIICADJAFm+NUhXFeKkS9IIHiBPSXdMvsfTeoTxY # 42BmaD7lZZwhzAlZuXcsFCimiwEXeZyAERmYpRs5LQ5LX3/4L+XvLghDLj6dkJla # wbI9SVzyzKrV14ZNrlfYCLp1PBnqMdV6tA0MG87u+k20svYEhyc31zFc32/0pN+K # MqnBN4dkyJNhBYX0Cpm2dWNp7Mkym3xlYGl8vWBnTnNpsPuu6kgmJaemIgglStrb # oJhInikNcM9xKhnjfl9+qwDMsPhmGwdoVrozqZFnDm6O3sgfGvNFDnS0hiWh9zv+ # FRP35NKXqQeDbp4D1dNStpFjxC21D2DSBpcaZm4hc9dryQvQv1a79h0GkOx9g4SI # 6x0dvDez7rU+jpJAlPVnozIMF94Wvw8YENaEAuxJu1UHcAZkBgbAHS3WZSFzVEGt # 2aEHj+MexkujWwaOgzDcikyvqFB7PCUsISc8imKMWHP2mmbA7csuCIe9Mg+YfFuE # lnBktaPpstBLw2MVhFa3pI71/F9f2I8H/5tezGiiFKBq4Ay+MBFoBlVHcZ+H9EBX # 6GYxwlQ2trcaJn5RUOnBeptCBwJYZKT8yei/NLeB/wutrw26pH5cWgcZbQhxCHjV # Y+GF+kJPQagRd8dhqz/fT2r3Z14DNUFSVdJQFeZDLZWqwn+SGfaQLnmRqdFkAl6q # r/166rye # SIG # End signature block
combined_dataset/train/non-malicious/sample_6_35.ps1
sample_6_35.ps1
# Load Common Library # Load Reporting Utilities #_#$debug = $false . ./utils_cts.ps1 . ./TS_RemoteSetup.ps1 # 2023-02-20 WalterE mod Trap #we# trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } $FirstTimeExecution = FirstTimeExecution if ($FirstTimeExecution) { if (Test-Path 'HKLM:\Cluster'){ [Array] $NodeNames = (Get-ClusterNode -ErrorAction SilentlyContinue | where-object {$_.State -match "up"}).Nodename #_# -EA added 2020-08-20 if (-not $NodeNames) {$NodeNames = $ComputerName} #_#added 2020-08-20 }else{ $NodeNames = $ComputerName } if ($Global:localNodeOnly -ne $true) { #_#[Array] $NodeNames = .\TS_SelectClusterNodes.ps1 if ($null -ne $NodeNames) { $ExpressionArray = @() $ItemNumber = 0 $ExpressionToRunOnMachine = @' Run-DiagExpression .\DC_BasicSystemInformation.ps1 -MachineName $Env:COMPUTERNAME Run-DiagExpression .\DC_ClusterLogs.ps1 #_#-LocalOnly Run-DiagExpression .\TS_DumpCollector.ps1 -CopyWERMinidumps -CopyMachineMiniDumps -MaxFileSize 300 -CopyMachineMemoryDump .\TS_AutoAddCommands_Cluster.ps1 Run-DiagExpression .\DC_SummaryReliability.ps1 '@ #_#if (($NodeNames.Count -eq 1) -and ($NodeNames[0] = $ComputerName)) if (($NodeNames -is [string]) -or (($NodeNames.Count -eq 1) -and ($NodeNames[0] -eq $ComputerName))){ if ($NodeNames.Count -eq 1){ "User/script selected local machine. Running package locally instead of using TS_Remote" | WriteTo-StdOut -ShortFormat $ExpressionToRunOnMachine += "`r`n Run-DiagExpression .\TS_BasicClusterInfo.ps1" } Invoke-Expression $ExpressionToRunOnMachine }else{ foreach ($MachineName in $NodeNames){ if ($ItemNumber -eq 0) { #Execute TS_BasicClusterInfo only in one node $ExpressionArray += ($ExpressionToRunOnMachine + "`r`n Run-DiagExpression .\TS_BasicClusterInfo.ps1") }else{ $ExpressionArray += $ExpressionToRunOnMachine } $ItemNumber += 1 } "Running package using TS_Remote on $NodeNames" | WriteTo-StdOut -ShortFormat #_# #_#ExecuteRemoteExpression -ComputerNames $NodeNames -Expression $ExpressionArray -ShowDialog ExecuteRemoteExpression -ComputerNames $NodeNames -Expression $ExpressionArray } if ($NodeNames -contains $ComputerName){ #TS_ClusterValidationTests.ps1 can be executed only locally due the issue with double hop authentication. "Running ClusterValidationTests on $ComputerName" | WriteTo-StdOut -ShortFormat #_# Run-DiagExpression .\TS_ClusterValidationTests.ps1 } } }else{ # run on localNodeOnly "User/script selected localNodeOnly. Running package locally instead of using TS_Remote" | WriteTo-StdOut -ShortFormat "User/script selected localNodeOnly." | Write-host Run-DiagExpression .\TS_BasicClusterInfo.ps1 Run-DiagExpression .\DC_BasicSystemInformation.ps1 -MachineName $Env:COMPUTERNAME Run-DiagExpression .\DC_ClusterLogs.ps1 #_#-LocalOnly .\TS_AutoAddCommands_Cluster.ps1 Run-DiagExpression .\DC_SummaryReliability.ps1 "Running ClusterValidationTests on $ComputerName" | WriteTo-StdOut -ShortFormat #_# Run-DiagExpression .\TS_ClusterValidationTests.ps1 if ($Global:skipSddcDiag -ne $true) { if ((test-path variable:psversiontable) -and ($PSVersionTable.PSVersion.Major -ge 5)) { #-# PrivateCloud.DiagnosticInfo Write-Host -BackgroundColor Gray -ForegroundColor Black -Object "--- $(Get-Date -Format 'HH:mm:ss') ... Start of SddcDiagnostic" & "$global:ToolsPath`\GetSddcDiagnosticInfo.ps1" -WriteToPath $($global:savePath + "\HealthTest") -ZipPrefix $($global:savePathTmp + "\_Sddc-Diag") Write-Host -BackgroundColor Gray -ForegroundColor Black -Object "--- $(Get-Date -Format 'HH:mm:ss') ... End of SddcDiagnostic" } } } #-# NetView Info if ($Global:skipNetview -ne $true) { Write-Host -BackgroundColor Gray -ForegroundColor Black -Object "--- $(Get-Date -Format 'HH:mm:ss') ...Start of Get-NetView (to skip this step, use skipNetview)" & "$global:ToolsPath`\GetNetView.ps1" -OutputDirectory $global:savePathTmp Write-Host -BackgroundColor Gray -ForegroundColor Black -Object "--- $(Get-Date -Format 'HH:mm:ss') ... End of Get-NetView" } EndDataCollection }else{ #2nd execution. Delete the temporary flag file then exit EndDataCollection -DeleteFlagFile $True } # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA/UkKvxYkibfuD # 2boJIgP43AcilD77P7pha/V7iQBl3KCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEID1u # v9zJbApCi14qa7semwdE7F2Rd+qw7uc8MPn0f3SOMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAifd+pGwFWczUtdPb4oq3oYo5c6UhWRj4eJ74 # fRBf8bRdLseuDTKv4BaOh4oLQZigJex/fRfILUGUI9/M3TPWn1OWZ0bAbcy2DMP8 # 1Xn1lIvWRPkdbxgUT8kZ0Kn86AXkxlmJJxEP+uB6Xpi51gSoyZ69apOY8AwOkpPP # myhLjbNgwsYcnYmP6vPbrXW7bEbC2OTnHpPY5AyB91L020FNsqKrXYBeDVuhlT+v # BFRdgriGOkqV2c/xU9cpQyP+AA5sshbqxV/OWDNjRTILmBwfPwVH4frz7J83dsXa # 1B/L2iAR+eDkoI67vSqUdjXQau41GN8xWDMiTq6dqDWREx9CcqGCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAFOyTvGL2ZfmC4a2rt5TxdiXxhUz3hLUGA # PkMwdx4bkQIGZxqNTrvSGBMyMDI0MTAyODExNDA1Mi4xMzRaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAAB # AAAB8jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYv # QBtnYJTtKKj2FKxzHx0fgV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29ed # zGdlWbCj1Qyx5HUHNY8yu9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv # 29h1ttNWsSc/KPOeuhzSAXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRY # cINfXDhURvUfD70jioE92rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycT # EOBdGVmf1HCD7WOaz5EEcQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZ # UzN+BzcLj96ixC7wJGQMBixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7 # b8M7vvwhEL0xCOvb7WFMsstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHD # oYhgj9uqPLP7vnoXf7j6+LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoe # h/r3fShL6CHgPoTB7oYU/d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69 # mL8BRtSZ6dG/GFEVE+fVmgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2 # t5DAoDkuKCbC+3VdPmlYVQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAx # BM5cH8Bg0+Y64oZ5MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00X # pOgPabcN3QZeyipgilcQSDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/t # aPnobF+8CkAdkcLQhLdkShfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5t # uvirFaUWzUWVDFOpo/O5zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRM # iJMzxpUlvdfWGUtCvnW3eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmw # psCtUh7tR6whCrVYkb6FudBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xL # zk0bNxsAj0uhd6QdWr6TT39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpUR # J6YiDKQd5YVgxsuZCWv4Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB # 8iQ5W8ZLM5PwT8vtsKEBwHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cX # WOMJUJzyEH4WSKZHOx53qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gV # PplqNPDIvQ8DkZ3lvbQsYqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspE # K8hllq3IYcyX0v897+X9YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQBri943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smo0TAi # GA8yMDI0MTAyODA2MDgxN1oYDzIwMjQxMDI5MDYwODE3WjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDqyajRAgEAMAoCAQACAgWXAgH/MAcCAQACAhK9MAoCBQDqyvpR # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBALgqZtdfGHfBazKoV8/843Ip # TSU07I0JGfXJbnovL0Q0rAjuvBKveKlK32WumSyuoR4Ya2ULLIJOczpFhgxpuw7I # 82xdhNLFLuUrbVXhH2XM4mZT5Ry8Zh18jBR2WevcePllwTXcOyduzQBlvbTB2ORn # Pwfg47LNUYexuXAKFm6kwKtXFC/N72WK/zV2LeO9FPCyUETpStdYiebSahH7im5d # DaFeNF7ZKKXp2zWG7JYvrT0HcUcAQmA+eg5ov2i7hkFxQzN008G+b+58Vq1QNSaz # 4CF2D4RxTXGrf9ICHuX2BOf8c/Ap/pKcZN/ZDEIgvuEnjDO2pvNkCh9EbxicT/4x # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AfI+MtdkrHCRlAABAAAB8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDii00SX/M1dI1JtLGqkh09 # zbrWhf5EeN4AJMj8q1cRbTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPja # Ph0uMVJc04+Y4Ru5BUUbHE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgemtf # KediGd1+I1jEAiEUlDRd8R1QCuXoLDc7YcA8zrAwDQYJKoZIhvcNAQELBQAEggIA # rRbDFCptPvfzM5W7V7buwHYuZL8a6ogyU2wGnJXcyk18pAzVaY/S+jvH1SLNvCS2 # pFDKbmjQYAiQbVMsR0qZm2tJc9+EFsvAYBe6UhEGlvGLZMiJI+7Ql7Wyc/3exHlk # /KRVKsTEACSQjnAKwiJEIJvn4tz0E7s/A0ADohLqcyPO25l029fKeqnhkhWdXJyP # gQLT3RA0Y1A0RrSZXxXT6PJIGy8tgSPglneQIUHdL2+HiVwZKEf8icgcFRGY316I # KCYJSi6nTbKyCe54zBRF2p8PY9WhwCPZfxLN2Nt4CsyscKNSjOwyvVsxHFjuHqe/ # ZoUhwtjgiTdAnOzo5ga2yXJEw4TkY/LqiY2Ty/z2wovczo/mnQIkQDhKMOsThl/t # 9mde7DRLvAWA+6rQ54vt+OA9ZU0YC9CrL/dTaIOEvjX/HH5A95a2i9Un6cCOf6E8 # lc3OeSRHstgE2w9xGIRvxhlRpAEDB0jAoP1cKqjzMPNSPrgzLCOITy0thoXuBvTG # PbE4Hc/ITPaAN5s1QEbQq9DggDNylWTI3wNZ0XzxuG9svqc1XPk61tZmdrzvv4E7 # 4vbhObXAKOHTtAwg/QoXYV5w39t/lzd1bbe42/np19AJ+0mu0HImsnsStaDhoEm3 # uvvcEpwy3dx1dUJd+NO1sjnU8xMm+M96dlmF0U+kqOg= # SIG # End signature block
combined_dataset/train/non-malicious/New-Type.ps1
New-Type.ps1
## New-Type (like Add-Type, but for PowerShell 1.0) ## Takes C# source code, and compiles it (in memory) for use in scripts ... #################################################################################################### ## USAGE EXAMPLE: ## New-Type @" ## using System; ## public struct User { ## public string Name; ## public int Age; ## public User(string name, int age) { ## Name = name; Age = age; ## } ## } ## "@ ## ## $user = New-Object User "Bobby",28 ## $user.Name #################################################################################################### ## NOTE: Save as New-Type.ps1 in your path, or uncomment the function line below (and the last line) #################################################################################################### #function New-Type { param([string]$TypeDefinition,[string[]]$ReferencedAssemblies) ## Obtains an ICodeCompiler from a CodeDomProvider class. $provider = New-Object Microsoft.CSharp.CSharpCodeProvider ## Get the location for System.Management.Automation DLL $dllName = [PsObject].Assembly.Location ## Configure the compiler parameters $compilerParameters = New-Object System.CodeDom.Compiler.CompilerParameters $assemblies = @("System.dll", $dllName) $compilerParameters.ReferencedAssemblies.AddRange($assemblies) if($ReferencedAssemblies) { $compilerParameters.ReferencedAssemblies.AddRange($ReferencedAssemblies) } $compilerParameters.IncludeDebugInformation = $true $compilerParameters.GenerateInMemory = $true $compilerResults = $provider.CompileAssemblyFromSource($compilerParameters, $TypeDefinition) if($compilerResults.Errors.Count -gt 0) { $compilerResults.Errors | % { Write-Error ("{0}:`t{1}" -f $_.Line,$_.ErrorText) } } #}
combined_dataset/train/non-malicious/2589.ps1
2589.ps1
param ( $Server ); [System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.SMO") | Out-Null; [System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.SMOExtended")| Out-Null; function writeHtmlPage { param ($title, $heading, $body, $filePath); $html = "<html> <head> <title>$title</title> </head> <body> <h1>$heading</h1> $body </body> </html>"; $html | Out-File -FilePath $filePath; } function getDatabases { param ($sql_server); $databases = $sql_server.Databases | Where-Object {$_.IsSystemObject -eq $false}; return $databases; } function getDatabaseSchemata { param ($sql_server, $database); $db_name = $database.Name; $schemata = $sql_server.Databases[$db_name].Schemas; foreach ($schema in $schemata) { if ( $schema.Owner -match '\\' ) {$schema.Owner = $schema.Owner -replace '\\', '-'}; } return $schemata; } function getDatabaseTables { param ($sql_server, $database); $db_name = $database.Name; $tables = $sql_server.Databases[$db_name].Tables | Where-Object {$_.IsSystemObject -eq $false}; return $tables; } function getDatabaseStoredProcedures { param ($sql_server, $database); $db_name = $database.Name; $procs = $sql_server.Databases[$db_name].StoredProcedures | Where-Object {$_.IsSystemObject -eq $false}; return $procs; } function getDatabaseFunctions { param ($sql_server, $database); $db_name = $database.Name; $functions = $sql_server.Databases[$db_name].UserDefinedFunctions | Where-Object {$_.IsSystemObject -eq $false}; return $functions; } function getDatabaseViews { param ($sql_server, $database); $db_name = $database.Name; $views = $sql_server.Databases[$db_name].Views | Where-Object {$_.IsSystemObject -eq $false}; return $views; } function getDatabaseTriggers { param ($sql_server, $database); $db_name = $database.Name; $tables = $sql_server.Databases[$db_name].Tables | Where-Object {$_.IsSystemObject -eq $false}; $triggers = $null; foreach($table in $tables) { $triggers += $table.Triggers; } return $triggers; } function getDBLogins { param ($sql_server, $database); $db_name = $database.Name; $logins = $sql_server.Databases[$db_name].Users; return $logins; } function getLogins { param ($sql_server); $logins = $sql_server.Logins | Where-Object {$_.IsSystemObject -eq $false}; return $logins; } function getLinkedServers { param ($sql_server); $linkedservers = $sql_server.LinkedServers; return $linkedservers; } function getJobs { param ($sql_server); $jobs = $sql_server.JobServer.Jobs; return $jobs; } function buildLinkList { param ($array, $path); $output = "<ul>"; foreach($item in $array) { if($item.IsSystemObject -eq $false) { if([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.Schema") { $output += "`n<li><a href=`"$path" + $item.Owner + ".html`">" + $item.Name + "</a></li>"; } elseif([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.Trigger") { $output += "`n<li><a href=`"$path" + $item.Parent.Schema + "." + $item.Name + ".html`">" + $item.Parent.Schema + "." + $item.Name + "</a></li>"; } elseif([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.Login") { $output += "`n<li><a href=`"$path" + ($item.Name -replace "\\", "-") + ".html`">" + $item.Name + "</a></li>"; } elseif([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.User") { $output += "`n<li><a href=`"$path" + ($item.Name -replace "\\", "-") + ".html`">" + $item.Name + "</a></li>"; } else { $output += "`n<li><a href=`"$path" + $item.Schema + "." + $item.Name + ".html`">" + $item.Schema + "." + $item.Name + "</a></li>"; } } elseif($item.IsSystemObject -eq $true) { if([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.Agent.Job") { $output += "`n<li><a href=`"$path" + $item + ".html`">" + $item + "</a></li>"; } elseif([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.LinkedServer") { $output += "`n<li><a href=`"$path" + $item.Name + ".html`">" + $item.Name + "</a></li>"; } elseif([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.User") { $output += "`n<li><a href=`"$path" + ($item.Name -replace "\\", "-") + ".html`">" + $item.Name + "</a></li>"; } } } $output += "</ul>"; return $output; } function getObjectDefinition { param ($item); $definition = ""; if([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.Schema") { $definition = $item.Script(); } else { $options = New-Object ('Microsoft.SqlServer.Management.Smo.ScriptingOptions'); $options.DriAll = $true; $options.Indexes = $true; $definition = $item.Script($options); } return "<pre>$definition</pre>"; } function getDescriptionExtendedProperty { param ($item); $description = "No extended property documentation on object."; foreach($property in $item.ExtendedProperties) { $description = $property.Value; } return $description; } function getProcParameterTable { param ($proc); $proc_params = $proc.Parameters; $prms = $proc_params | ConvertTo-Html -Fragment -Property Name, DataType, DefaultValue, IsOutputParameter; return $prms; } function getTableColumnTable { param ($table); $table_columns = $table.Columns; $objs = @(); foreach($column in $table_columns) { $obj = New-Object -TypeName Object; $description = getDescriptionExtendedProperty $column; Add-Member -Name "Name" -MemberType NoteProperty -Value $column.Name -InputObject $obj; Add-Member -Name "DataType" -MemberType NoteProperty -Value $column.DataType -InputObject $obj; Add-Member -Name "Default" -MemberType NoteProperty -Value $column.Default -InputObject $obj; Add-Member -Name "Identity" -MemberType NoteProperty -Value $column.Identity -InputObject $obj; Add-Member -Name "InPrimaryKey" -MemberType NoteProperty -Value $column.InPrimaryKey -InputObject $obj; Add-Member -Name "IsForeignKey" -MemberType NoteProperty -Value $column.IsForeignKey -InputObject $obj; Add-Member -Name "Description" -MemberType NoteProperty -Value $description -InputObject $obj; $objs = $objs + $obj; } $cols = $objs | ConvertTo-Html -Fragment -Property Name, DataType, Default, Identity, InPrimaryKey, IsForeignKey, Description; return $cols; } function getTriggerDetailsTable { param ($trigger); $trigger_details = $trigger | ConvertTo-Html -Fragment -Property IsEnabled, CreateDate, DateLastModified, Delete, DeleteOrder, Insert, InsertOrder, Update, UpdateOrder; return $trigger_details; } function createObjectTypePages { param ($objectName, $objectArray, $filePath, $db); New-Item -Path $($filePath + $db.Name + "\$objectName") -ItemType directory -Force | Out-Null; $page = $filePath + $($db.Name) + "\$objectName\index.html"; $list = buildLinkList $objectArray ""; if($objectArray -eq $null) { $list = "No $objectName in $db"; } writeHtmlPage $objectName $objectName $list $page; if($objectArray.Count -gt 0) { foreach ($item in $objectArray) { if($item.IsSystemObject -eq $false) { $description = getDescriptionExtendedProperty($item); $body = "<h2>Description</h2>$description"; $definition = getObjectDefinition $item; if([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.Schema") { $page = $filePath + $($db.Name + "\$objectName\" + $item.Owner + ".html"); } elseif([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.Trigger") { $page = $filePath + $($db.Name + "\$objectName\" + $item.Parent.Schema + "." + $item.Name + ".html"); } elseif([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.Login") { $page = $filePath + $($db.Name + "\$objectname\" + ($item.Name -replace "\\", "-") + ".html"); } elseif([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.User") { $page = $filePath + $($db.Name + "\$objectname\" + ($item.Name -replace "\\", "-") + ".html"); } else { $page = $filePath + $($db.Name + "\$objectName\" + $item.Schema + "." + $item.Name + ".html"); } $title = ""; if([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.Schema") { $title = $item.Name; $body += "<h2>Object Definition</h2>$definition"; } elseif([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.Login") { $title = $item.Name; $body += "<h2>Object Definition</h2>$definition"; } else { $title = $item.Schema + "." + $item.Name; if(([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.StoredProcedure") -or ([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.UserDefinedFunction")) { $proc_params = getProcParameterTable $item; $body += "<h2>Parameters</h2>$proc_params<h2>Object Definition</h2>$definition"; } elseif([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.Table") { $cols = getTableColumnTable $item; $body += "<h2>Columns</h2>$cols<h2>Object Definition</h2>$definition"; } elseif([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.View") { $cols = getTableColumnTable $item; $body += "<h2>Columns</h2>$cols<h2>Object Definition</h2>$definition"; } elseif([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.Trigger") { $title = $item.Parent.Schema + "." + $item.Name; $trigger_details = getTriggerDetailsTable $item; $body += "<h2>Details</h2>$trigger_details<h2>Object Definition</h2>$definition"; } } } elseif($item.IsSystemObject -eq $true) { $description = getDescriptionExtendedProperty($item); $body = "<h2>Description</h2>$description"; $definition = getObjectDefinition $item; if([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.Agent.Job") { $title = $item; $page = $filePath + $($db.Name + "\$objectName\" + $item + ".html"); $body += "<h2>Object Definition</h2>$definition"; } elseif([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.LinkedServer") { $title = $item.Name; $page = $filePath + $($db.Name + "\$objectName\" + $item.Name + ".html"); $body += "<h2>Object Definition</h2>$definition"; } if([string]$item.GetType() -eq "Microsoft.SqlServer.Management.Smo.User") { $title = $item.Name; $page = $filePath + $($db.Name + "\$objectName\" + $item.Name + ".html"); $body += "<h2>Object Definition</h2>$definition"; } } writeHtmlPage $title $title $body $page; } } } $filePath = "$env:USERPROFILE\database_documentation\$Server\"; New-Item -Path $filePath -ItemType directory -Force | Out-Null; $sql_server = New-Object Microsoft.SqlServer.Management.Smo.Server $Server; $sql_server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.Table], "IsSystemObject"); $sql_server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.View], "IsSystemObject"); $sql_server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.StoredProcedure], "IsSystemObject"); $sql_server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.Trigger], "IsSystemObject"); $sql_server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.User], "IsSystemObject"); $databases = getDatabases $sql_server; $linkedservers = getLinkedServers $sql_server; createObjectTypePages "LinkedServers" $linkedservers $filePath; Write-Host "Documented Linked Servers on " $sql_server.Name; $jobs = getJobs $sql_server; createObjectTypePages "Jobs" $jobs $filePath; Write-Host "Documented Jobs on " $sql_server.Name; $logins = getLogins $sql_server; createObjectTypePages "Logins" $logins $filePath; Write-Host "Documented Logins on " $sql_server.Name; foreach ($db in $databases) { Write-Host "Started documenting " $db.Name; New-Item -Path $($filePath + $db.Name) -ItemType directory -Force | Out-Null; $db_page = $filePath + $($db.Name) + "\index.html"; $body = "<ul> <li><a href='Schemata/index.html'>Schemata</a></li> <li><a href='Tables/index.html'>Tables</a></li> <li><a href='Views/index.html'>Views</a></li> <li><a href='Stored Procedures/index.html'>Stored Procedures</a></li> <li><a href='Functions/index.html'>Functions</a></li> <li><a href='Triggers/index.html'>Triggers</a></li> <li><a href='Users/index.html'>Users</a></li> </ul>"; writeHtmlPage $db $db $body $db_page; $schemata = getDatabaseSchemata $sql_server $db; createObjectTypePages "Schemata" $schemata $filePath $db; Write-Host "`tDocumented schemata in " $db.Name; $tables = getDatabaseTables $sql_server $db; createObjectTypePages "Tables" $tables $filePath $db; Write-Host "Documented tables in " $db.Name; $views = getDatabaseViews $sql_server $db; createObjectTypePages "Views" $views $filePath $db; Write-Host "`tDocumented views in " $db.Name; $procs = getDatabaseStoredProcedures $sql_server $db; createObjectTypePages "Stored Procedures" $procs $filePath $db; Write-Host "`tDocumented stored procedures in " $db.Name; $functions = getDatabaseFunctions $sql_server $db; createObjectTypePages "Functions" $functions $filePath $db; Write-Host "`tDocumented functions in " $db.Name; $triggers = getDatabaseTriggers $sql_server $db; createObjectTypePages "Triggers" $triggers $filePath $db; Write-Host "`tDocumented triggers in " $db.Name; $logins = getDBLogins $sql_server $db; createObjectTypePages "Users" $logins $filePath $db; Write-Host "`tDocumented Users in " $db.Name; Write-Host "Finished documenting " $db.Name; }
combined_dataset/train/non-malicious/sample_26_61.ps1
sample_26_61.ps1
# # Module manifest for module 'OCI.PSModules.Vulnerabilityscanning' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Vulnerabilityscanning.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '3a30f199-7c6d-48cf-8a14-f4fa8ff17785' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Vulnerabilityscanning Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vulnerabilityscanning.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Export-OCIVulnerabilityscanningHostAgentScanResultCsv', 'Export-OCIVulnerabilityscanningHostVulnerabilityCsv', 'Get-OCIVulnerabilityscanningContainerScanRecipe', 'Get-OCIVulnerabilityscanningContainerScanRecipesList', 'Get-OCIVulnerabilityscanningContainerScanResult', 'Get-OCIVulnerabilityscanningContainerScanResultsList', 'Get-OCIVulnerabilityscanningContainerScanTarget', 'Get-OCIVulnerabilityscanningContainerScanTargetsList', 'Get-OCIVulnerabilityscanningHostAgentScanResult', 'Get-OCIVulnerabilityscanningHostAgentScanResultsList', 'Get-OCIVulnerabilityscanningHostCisBenchmarkScanResult', 'Get-OCIVulnerabilityscanningHostCisBenchmarkScanResultsList', 'Get-OCIVulnerabilityscanningHostEndpointProtectionScanResult', 'Get-OCIVulnerabilityscanningHostEndpointProtectionScanResultsList', 'Get-OCIVulnerabilityscanningHostPortScanResult', 'Get-OCIVulnerabilityscanningHostPortScanResultsList', 'Get-OCIVulnerabilityscanningHostScanRecipe', 'Get-OCIVulnerabilityscanningHostScanRecipesList', 'Get-OCIVulnerabilityscanningHostScanTarget', 'Get-OCIVulnerabilityscanningHostScanTargetErrorsList', 'Get-OCIVulnerabilityscanningHostScanTargetsList', 'Get-OCIVulnerabilityscanningHostVulnerabilitiesList', 'Get-OCIVulnerabilityscanningHostVulnerability', 'Get-OCIVulnerabilityscanningHostVulnerabilityImpactedHostsList', 'Get-OCIVulnerabilityscanningVulnerabilitiesList', 'Get-OCIVulnerabilityscanningVulnerability', 'Get-OCIVulnerabilityscanningVulnerabilityImpactedContainersList', 'Get-OCIVulnerabilityscanningVulnerabilityImpactedHostsList', 'Get-OCIVulnerabilityscanningWorkRequest', 'Get-OCIVulnerabilityscanningWorkRequestErrorsList', 'Get-OCIVulnerabilityscanningWorkRequestLogsList', 'Get-OCIVulnerabilityscanningWorkRequestsList', 'Move-OCIVulnerabilityscanningContainerScanRecipeCompartment', 'Move-OCIVulnerabilityscanningContainerScanResultCompartment', 'Move-OCIVulnerabilityscanningContainerScanTargetCompartment', 'Move-OCIVulnerabilityscanningHostAgentScanResultCompartment', 'Move-OCIVulnerabilityscanningHostCisBenchmarkScanResultCompartment', 'Move-OCIVulnerabilityscanningHostEndpointProtectionScanResultCompartment', 'Move-OCIVulnerabilityscanningHostPortScanResultCompartment', 'Move-OCIVulnerabilityscanningHostScanRecipeCompartment', 'Move-OCIVulnerabilityscanningHostScanTargetCompartment', 'New-OCIVulnerabilityscanningContainerScanRecipe', 'New-OCIVulnerabilityscanningContainerScanTarget', 'New-OCIVulnerabilityscanningHostScanRecipe', 'New-OCIVulnerabilityscanningHostScanTarget', 'Remove-OCIVulnerabilityscanningContainerScanRecipe', 'Remove-OCIVulnerabilityscanningContainerScanResult', 'Remove-OCIVulnerabilityscanningContainerScanTarget', 'Remove-OCIVulnerabilityscanningHostAgentScanResult', 'Remove-OCIVulnerabilityscanningHostCisBenchmarkScanResult', 'Remove-OCIVulnerabilityscanningHostEndpointProtectionScanResult', 'Remove-OCIVulnerabilityscanningHostPortScanResult', 'Remove-OCIVulnerabilityscanningHostScanRecipe', 'Remove-OCIVulnerabilityscanningHostScanTarget', 'Update-OCIVulnerabilityscanningContainerScanRecipe', 'Update-OCIVulnerabilityscanningContainerScanTarget', 'Update-OCIVulnerabilityscanningHostScanRecipe', 'Update-OCIVulnerabilityscanningHostScanTarget' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vulnerabilityscanning' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_45_17.ps1
sample_45_17.ps1
# # Module manifest for module 'OCI.PSModules.Bds' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Bds.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'bf0fa8b6-185c-48cd-804a-7e6cda32003d' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Bds Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Bds.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIBdsAutoScalingConfiguration', 'Add-OCIBdsBlockStorage', 'Add-OCIBdsCloudSql', 'Add-OCIBdsKafka', 'Add-OCIBdsMasterNodes', 'Add-OCIBdsUtilityNodes', 'Add-OCIBdsWorkerNodes', 'Disable-OCIBdsCertificate', 'Enable-OCIBdsCertificate', 'Enable-OCIBdsMetastoreConfiguration', 'Get-OCIBdsApiKey', 'Get-OCIBdsApiKeysList', 'Get-OCIBdsAutoScalingConfiguration', 'Get-OCIBdsAutoScalingConfigurationsList', 'Get-OCIBdsInstance', 'Get-OCIBdsInstancesList', 'Get-OCIBdsMetastoreConfiguration', 'Get-OCIBdsMetastoreConfigurationsList', 'Get-OCIBdsOsPatchDetails', 'Get-OCIBdsOsPatchesList', 'Get-OCIBdsPatchesList', 'Get-OCIBdsPatchHistoriesList', 'Get-OCIBdsWorkRequest', 'Get-OCIBdsWorkRequestErrorsList', 'Get-OCIBdsWorkRequestLogsList', 'Get-OCIBdsWorkRequestsList', 'Invoke-OCIBdsCertificateServiceInfo', 'Invoke-OCIBdsExecuteBootstrapScript', 'Invoke-OCIBdsInstallOsPatch', 'Invoke-OCIBdsInstallPatch', 'Invoke-OCIBdsRenewCertificate', 'Invoke-OCIBdsTestBdsMetastoreConfiguration', 'Invoke-OCIBdsTestBdsObjectStorageConnection', 'Move-OCIBdsInstanceCompartment', 'Move-OCIBdsShape', 'New-OCIBdsApiKey', 'New-OCIBdsInstance', 'New-OCIBdsMetastoreConfiguration', 'Remove-OCIBdsApiKey', 'Remove-OCIBdsAutoScalingConfiguration', 'Remove-OCIBdsCloudSql', 'Remove-OCIBdsInstance', 'Remove-OCIBdsKafka', 'Remove-OCIBdsMetastoreConfiguration', 'Remove-OCIBdsNode', 'Restart-OCIBdsNode', 'Start-OCIBdsInstance', 'Stop-OCIBdsInstance', 'Update-OCIBdsAutoScalingConfiguration', 'Update-OCIBdsInstance', 'Update-OCIBdsMetastoreConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Bds' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Remove-Trash.ps1
Remove-Trash.ps1
#requires -version 2.0 add-type @" using System; using System.Runtime.InteropServices; using Microsoft.Win32; namespace recyclebin { public class Empty { [DllImport("shell32.dll")] static extern int SHEmptyRecycleBin(IntPtr hWnd, string pszRootPath, uint dwFlags); public static void EmptyTrash(string RootDrive, uint Flags) { SHEmptyRecycleBin(IntPtr.Zero, RootDrive, Flags); } } } "@ cmdlet Remove-Trash -snapin CMSchill.RemoveTrash { param( [Parameter(Position=0, Mandatory=$false)][string]$Drive = "", [switch]$NoConfirmation, [switch]$NoProgressGui, [switch]$NoSound ) [int]$Flags = 0 if ( $NoConfirmation ) { $Flags = $Flags -bor 1 } if ( $NoProgressGui ) { $Flags = $Flags -bor 2 } if ( $NoSound ) { $Flags = $Flags -bor 4 } [recyclebin.Empty]::EmptyTrash($RootPath, $Flags) }
combined_dataset/train/non-malicious/WPF v3 DEMO.ps1
WPF v3 DEMO.ps1
# Plik: 4_Demo_v3_Reflection.ps1 #requires -version 3 $Akceleratory = [PSObject]. Assembly. GetType("System.Management.Automation.TypeAccelerators") Add-Type -AssemblyName PresentationCore, PresentationFramework -PassThru | Where-Object IsPublic | ForEach-Object { $Class = $_ try { $Akceleratory::Add($Class.Name,$Class) } catch { "Failed to add $($Class.Name) accelerator pointing to $($Class.FullName)" } } [Window]@{ OpacityMask = [DrawingBrush]@{ Drawing = [DrawingGroup]@{ Children = & { $Kolekcja = New-Object DrawingCollection $Kolekcja.Add([GeometryDrawing]@{ Brush = 'Black' Geometry = [EllipseGeometry]@{ radiusX = 0.48 radiusY = 0.48 Center = '0.5,0.5' } }) $Kolekcja.Add([GeometryDrawing]@{ Brush = 'Transparent' Geometry = [RectangleGeometry]@{ Rect = '0,0,1,1' } }) , $Kolekcja } } } Background = [LinearGradientBrush]@{ Opacity = 0.5 StartPoint = '0,0.5' Endpoint = '1,0.5' GradientStops = & { $Stopki = New-Object GradientStopCollection $Colors = 'Blue', 'Green' foreach ($i in 0..1) { $Stopki.Add( [GradientStop]@{ Color = $Colors[$i] Offset = $i } ) } , $Stopki } } Width = 800 Height = 400 WindowStyle = 'None' AllowsTransparency = $true Effect = [DropShadowEffect]@{ BlurRadius = 10 } TopMost = $true Content = & { $Stos = [StackPanel]@{ VerticalAlignment = 'Center' HorizontalAlignment = 'Center' } $Stos.AddChild( [Label]@{ Content = 'PowerShell Rocks!' FontSize = 80 FontFamily = 'Consolas' Foreground = 'White' Effect = [DropShadowEffect]@{ BlurRadius = 5 } } ) , $Stos } } | ForEach-Object { $_.Add_MouseLeftButtonDown({ $this.DragMove() }) $_.Add_MouseRightButtonDown({ $this.Close() }) $_.ShowDialog() | Out-Null }
combined_dataset/train/non-malicious/Form manipulation.ps1
Form manipulation.ps1
$code = @' using System; using System.Runtime.InteropServices; namespace LibWrap { public class Animator { [DllImport("user32.dll")] public static extern bool AnimateWindow(IntPtr hWnd, uint dwTime, uint dwFlags); } } '@ function BuildAssembly { $cscp = New-Object Microsoft.CSharp.CSharpCodeProvider $cpar = New-Object CodeDom.Compiler.CompilerParameters $cpar.GenerateInMemory = $true $exec = $cscp.CompileAssemblyFromSource($cpar, $code) } $frmMain_OnClick= { BuildAssembly [void][LibWrap.Animator]::AnimateWindow($frmMain.Handle, 1000, 0x90000) $end = [DateTime]::Now.AddSeconds(3) while ($end -gt [DateTime]::Now) { Start-Sleep -m 1000 } [void][LibWrap.Animator]::AnimateWindow($frmMain.Handle, 1000, 0x80000) } $frmMain_OnLoad= { $g = New-Object Drawing.Drawing2D.GraphicsPath $g.AddEllipse($frmMain.ClientRectangle) $frmMain.Region = New-Object Drawing.Region($g) } function ShowMainWindow { [void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") [void][Reflection.Assembly]::LoadWithPartialName("System.Drawing") [Windows.Forms.Application]::EnableVisualStyles() $frmMain = New-Object Windows.Forms.Form #frmMain $frmMain.ClientSize = New-Object Drawing.Size(300, 300) $frmMain.MaximizeBox = $false $frmMain.StartPosition = "CenterScreen" $frmMain.Add_Click($frmMain_OnClick) $frmMain.Add_KeyDown( { if ($_.KeyCode -eq "Escape") { $frmMain.Close() } } ) $frmMain.Add_Load($frmMain_OnLoad) [void]$frmMain.ShowDialog() } ShowMainWindow
combined_dataset/train/non-malicious/sample_61_82.ps1
sample_61_82.ps1
<# .SYNOPSIS MSRD-Collect global functions .DESCRIPTION Module for the MSRD-Collect global functions .NOTES Author : Robert Klemencz Requires : At least PowerShell 5.1 (This module is not for stand-alone use. It is used automatically from within the main MSRD-Collect.ps1 script) Version : See MSRD-Collect.ps1 version Feedback : Send an e-mail to MSRDCollectTalk@microsoft.com #> if (!($global:msrdTSSinUse)) { $global:LogLevel = @{ 'Normal' = 0 'Info' = 1 'Warning' = 2 'Error' = 3 #'Debug' = 4 'ErrorLogFileOnly' = 5 'WarnLogFileOnly' = 6 'InfoLogFileOnly' = 7 'DiagFileOnly' = 9 } } #region initialization if (($global:msrdOSVer -like "*Server*2008*") -or ($global:msrdOSVer -like "*Server*2012*") -or ($global:msrdOSVer -like "*Windows 7*")) { [string]$global:WinVerMajor = (Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion' CurrentVersion).CurrentVersion } else { [string]$global:WinVerMajor = (Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion' CurrentMajorVersionNumber).CurrentMajorVersionNumber [string]$global:WinVerMinor = (Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion' CurrentMinorVersionNumber).CurrentMinorVersionNumber } [int]$global:WinVerBuild = (Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion' CurrentBuild).CurrentBuild [string]$global:WinVerRevision = (Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion' UBR).UBR function msrdInitScript { param ([string]$Type, $isTSS) if (!($isTSS)) { $initValues = @("$(msrdGetLocalizedText initvalues1a) $global:msrdVersion $(msrdGetLocalizedText initvalues1b) $global:msrdScriptpath", "$(msrdGetLocalizedText initvalues1c) $global:msrdCmdLine", "$(msrdGetLocalizedText initvalues2)", "$(msrdGetLocalizedText initvalues3) $global:msrdLogRoot", "$(msrdGetLocalizedText initvalues4) $global:msrdUserprof`n" ) $initValues | ForEach-Object { if ($type -eq 'GUI') { msrdAdd-OutputBoxLine $_ } else { msrdLogMessage $LogLevel.Info $_ } } } $unsupportedOSMessage = "This Windows release is no longer supported. Please upgrade the machine to a more current, in-service, and supported Windows release." if ((($global:WinVerMajor -like "*10*") -and (@("10240", "10586", "14393", "15063", "16299", "17134", "17763", "18362", "18363", "19041", "19042", "19043") -contains $global:WinVerBuild) -and !($global:msrdOSVer -like "*Server*")) -or ($global:msrdOSVer -like "*Windows 8*") -or ($global:msrdOSVer -like "*Windows 7*")) { if ($type -eq 'GUI') { msrdAdd-OutputBoxLine $unsupportedOSMessage -Color "Yellow" } else { Write-Warning $unsupportedOSMessage } } $unsupportedOSMessageExt = @{ "*Server 2008 R2*" = "The Windows Server 2008 R2 Extended Security Update (ESU) Program ended on January 10, 2023. 'Azure only' ESU will end on January 9, 2024. See: <a href='https://learn.microsoft.com/en-us/lifecycle/products/windows-server-2008-r2' target='_blank'>Windows Server 2008 R2</a>. Please upgrade the machine to a more current, in-service, and supported Windows release.`n"; } if ($unsupportedOSMessageExt.ContainsKey($global:msrdOSVer)) { if ($type -eq 'GUI') { msrdAdd-OutputBoxLine $unsupportedOSMessageExt[$global:msrdOSVer] -Color "Yellow" } else { Write-Warning $unsupportedOSMessageExt[$global:msrdOSVer] } } } function msrdInitScenarioVars { $vars = "vProfiles", "vActivation", "vMSRA", "vSCard", "vIME", "vTeams", "vMSIXAA", "vHCI" foreach ($var in $vars) { $var = $script:varsNO } $script:dumpProc = $False; $script:pidProc = "" $script:traceNet = $False; $global:onlyDiag = $false } Function msrdInitFolders { if ($global:msrdTSSinUse) { $global:msrdLogFolder = "MSRD-Results-" + $env:computername } else { $global:msrdLogFolder = "MSRD-Results-" + $env:computername +"-" + $(get-date -f yyyyMMdd_HHmmss) } $global:msrdLogDir = "$global:msrdLogRoot\$global:msrdLogFolder\" $global:msrdLogFilePrefix = $env:computername + "_" $global:msrdBasicLogFolder = $global:msrdLogDir + $global:msrdLogFilePrefix $global:msrdErrorLogFile = $global:msrdBasicLogFolder + "MSRD-Collect-Error.txt" $global:msrdTempCommandErrorFile = $global:msrdBasicLogFolder + "MSRD-Collect-CommandError.txt" $global:msrdOutputLogFile = $global:msrdBasicLogFolder + "MSRD-Collect-Log.txt" $global:msrdEventLogFolder = $global:msrdBasicLogFolder + "EventLogs\" $global:msrdNetLogFolder = $global:msrdBasicLogFolder + "Networking\" $global:msrdRDSLogFolder = $global:msrdBasicLogFolder + "RDS\" $global:msrdAVDLogFolder = $global:msrdBasicLogFolder + "AVD\" $global:msrdRegLogFolder = $global:msrdBasicLogFolder + "RegistryKeys\" $global:msrdSchtaskFolder = $global:msrdBasicLogFolder + "ScheduledTasks\" $global:msrdSysInfoLogFolder = $global:msrdBasicLogFolder + "SystemInfo\" $global:msrdGenevaLogFolder = $global:msrdBasicLogFolder + "AVD\Monitoring\" if ($global:msrdAVD -or $global:msrdW365) { $global:msrdTechFolder = $global:msrdAVDLogFolder } else { $global:msrdTechFolder = $global:msrdRDSLogFolder } try { $createfolder = New-Item -itemtype directory -path $global:msrdLogDir -ErrorAction Stop } catch { $failedCommand = $_.InvocationInfo.Line.TrimStart() $errorMessage = $_.Exception.Message.TrimStart() msrdLogException ("$(msrdGetLocalizedText "errormsg") $failedCommand") -ErrObj $_ -fErrorLogFileOnly } } # create folders Function msrdCreateLogFolder { Param( [parameter(Mandatory=$true)][ValidateNotNullOrEmpty()][string]$Path, $TimeStamp ) If (!(Test-Path -Path $Path)) { $p = $Path.TrimEnd('\') Try { if ($TimeStamp -eq "No") { $LogMessage = "$(msrdGetLocalizedText "logfoldermsg") $p" } else { if ($global:msrdLangID -eq "AR") { $date = Get-Date $day = $date.Day.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $month = $date.Month.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $year = $date.Year.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $hour = $date.Hour.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $minute = $date.Minute.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $second = $date.Second.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $millisecond = $date.Millisecond.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $datemsg = "${hour}:${minute}:${second}.${millisecond} ${year}/${month}/${day}" } else { $datemsg = (Get-Date).ToString("yyyy/MM/dd HH:mm:ss.fff") } $LogMessage = $datemsg + " $(msrdGetLocalizedText "logfoldermsg") $p" } if ($global:msrdGUI) { msrdAdd-OutputBoxLine $LogMessage "Yellow" } else { $host.ui.RawUI.ForegroundColor = "Yellow" Write-Output $LogMessage $host.ui.RawUI.ForegroundColor = $global:msrdConsoleColor } if ($global:msrdCollecting -or $global:msrdDiagnosing) { $LogMessage | Out-File -Append $global:msrdOutputLogFile } New-Item -Path $Path -ItemType Directory | Out-Null } Catch { $failedCommand = $_.InvocationInfo.Line.TrimStart() $errorMessage = $_.Exception.Message.TrimStart() msrdLogException ("$(msrdGetLocalizedText "errormsg") $failedCommand") -ErrObj $_ -fErrorLogFileOnly if ($global:msrdGUI) { msrdAdd-OutputBoxLine ("Error in $failedCommand $errorMessage") "Magenta" } else { msrdLogMessage $LogLevel.Warning ("Error in $failedCommand $errorMessage") } return } } else { msrdLogMessage $LogLevel.WarnLogFileOnly "$Path $(msrdGetLocalizedText "logfolderexistmsg")" } } function msrdGetLocalizedText ($textID) { $textIDlang = $textID + $global:msrdLangID $LangTextNode = $global:msrdLangText.LangV1.lang | Where-Object {$_.id -eq $textIDlang} if($LangTextNode -ne $null) { $LangTextCode = @() $LangTextCode += $LangTextNode."#text" if ($LangTextCode -like "*&amp;*") { $LangTextCode = $LangTextCode.replace("&amp;","&") } return $LangTextCode } else { $textIDlang = $textID + "EN" $LangTextNode = $global:msrdLangText.LangV1.lang | Where-Object {$_.id -eq $textIDlang} if($LangTextNode -ne $null) { $LangTextCode = @() $LangTextCode += $LangTextNode."#text" if ($LangTextCode -like "*&amp;*") { $LangTextCode = $LangTextCode.replace("&amp;","&") } return $LangTextCode } } return $null } function msrdGetSysInternalsProcDump { try { $PDurl = 'https://github.com/MicrosoftDocs/sysinternals/blob/main/sysinternals/downloads/procdump.md' $PDWSProxy = New-Object System.Net.WebProxy $PDWSWebSession = New-Object Microsoft.PowerShell.Commands.WebRequestSession $PDWSWebSession.Proxy = $PDWSProxy $PDWSWebSession.Credentials = [System.Net.CredentialCache]::DefaultCredentials $PDresponse = Invoke-WebRequest -Uri $PDurl -WebSession $PDWSWebSession -UseBasicParsing -TimeoutSec 30 if ($PDresponse) { # Use the regular expression to extract the Procdump version $regexPattern = 'ProcDump v([\d\.]+)' $PDmatches = [regex]::Matches($PDresponse.Content, $regexPattern) if ($PDmatches.Count -gt 0) { # The version number should be in the first capturing group of the first match $PDonlineVersion = $PDmatches[0].Groups[1].Value } if ($PDonlineVersion -and ([version]$PDonlineVersion -gt [version]$global:msrdProcDumpVer)) { if ($global:msrdProcDumpVer -eq "1.0") { $PDnotice = "This MSRD-Collect version is missing ProcDump.exe.`nIt is recommended to redownload the full MSRD-Collect (or TSS) package or download the latest version of ProcDump ($PDonlineVersion) from SysInternals.`nDo you want to download ProcDump from SysInternals now?" } else { $PDnotice = "This MSRD-Collect version comes with ProcDump version $global:msrdProcDumpVer.`nA newer version of ProcDump ($PDonlineVersion) from SysInternals is available for download.`nDo you want to update the local ProcDump version now?" } $PDresult = [System.Windows.Forms.MessageBox]::Show($PDnotice, "New ProcDump version available", [System.Windows.Forms.MessageBoxButtons]::YesNo, [System.Windows.Forms.MessageBoxIcon]::Warning) if ($PDresult -eq [System.Windows.Forms.DialogResult]::Yes) { $PDzipFile = Join-Path $env:TEMP 'Procdump.zip' $PDdownloadUrl = 'https://download.sysinternals.com/files/Procdump.zip' Invoke-WebRequest -Uri $PDdownloadUrl -OutFile $PDzipFile $PDunzippedFolder = Join-Path $env:TEMP 'Procdump' Expand-Archive -Path $PDzipFile -DestinationPath $PDunzippedFolder -Force msrdCreateLogFolder -msrdLogFolder "$global:msrdScriptpath\Tools" -TimeStamp No Copy-Item -Path (Join-Path $PDunzippedFolder "procdump.exe") -Destination $global:msrdToolsFolder -Force $global:msrdProcDumpExe = "$global:msrdScriptpath\Tools\procdump.exe" Remove-Item $PDzipFile Remove-Item $PDunzippedFolder -Recurse -Force #update procdump version in .cfg file msrdUpdateConfigFile -configFile "MSRD-Collect.cfg" -key "ProcDumpVersion" -value $PDonlineVersion $global:msrdProcDumpVer = $PDonlineVersion $PDdownloadmsg = "ProcDump version $PDonlineVersion has been downloaded and extracted to $global:msrdToolsFolder`nConfig file has been updated" if ($global:msrdGUI) { msrdAdd-OutputBoxLine $PDdownloadmsg -Color Yellow } else { msrdLogMessage $LogLevel.Info $PDdownloadmsg } } else { if ($global:msrdProcDumpVer -eq "1.0") { $noPDdownloadmsg = "You have chosen not to download the latest available ProcDump version ($PDonlineVersion) from SysInternals. It will not be possible to collect process dumps using MSRD-Collect" } else { $noPDdownloadmsg = "You have chosen not to download the latest available ProcDump version ($PDonlineVersion) from SysInternals. The current, local version $global:msrdProcDumpVer will be used when needed" } if ($global:msrdGUI) { msrdAdd-OutputBoxLine $noPDdownloadmsg -Color Yellow } else { msrdLogMessage $LogLevel.Info $noPDdownloadmsg } } } else { if ($global:msrdGUI) { msrdAdd-OutputBoxLine ("$(msrdGetLocalizedText "PDvercheck1") ($global:msrdProcDumpVer)") -Color Lightgreen } else { msrdLogMessage $LogLevel.Info ("$(msrdGetLocalizedText "PDvercheck1") ($global:msrdProcDumpVer)") -Color Green } } $PDWSProxy = $null } else { $global:msrdSetWarning = $true msrdLogMessage DiagFileOnly -Type "Text" -col 3 -Message "ProcDump version information could not be retrieved." -circle "red" } } catch { $global:aucfail = $true $failedCommand = $_.InvocationInfo.Line.TrimStart() $errorMessage = $_.Exception.Message.TrimStart() if ($global:msrdGUI) { msrdAdd-OutputBoxLine ("Error in $failedCommand $errorMessage") "Magenta" } else { msrdLogMessage $LogLevel.Warning ("Error in $failedCommand $errorMessage") } } } function msrdProcDumpVerCheck { if ($global:msrdProcDumpExe -eq "") { $noPDmsg = "ProcDump.exe could not be found. It will not be possible to collect a Process Dump through MSRD-Collect unless ProcDump.exe is available." if ($global:msrdGUI) { msrdAdd-OutputBoxLine $noPDmsg -Color Yellow } else { msrdLogMessage $LogLevel.Info $noPDmsg } } msrdGetSysInternalsProcDump if ($global:msrdGUI) { msrdAdd-OutputBoxLine ("") } else { msrdLogMessage $LogLevel.Info "`n" -NoDate } } #endregion initialization #region messages Function msrdLogMessage { param( [ValidateNotNullOrEmpty()][Int]$Level = $LogLevel.Normal, [string]$Message, [string]$Color, [Switch]$noDate, [Switch]$addAssist, [string]$LogPrefix ) If (!(Test-Path -Path $global:msrdLogDir)) { msrdCreateLogFolder $global:msrdLogDir } $global:msrdPerc = "{0:P}" -f ($global:msrdProgress/100) $LogConsole = $True if ($LogPrefix) { if ($global:msrdLangID -eq "AR") { $Message = "$Message [$LogPrefix]" } else { $Message = "[$LogPrefix] $Message" } } switch ($Level) { '0' { $MessageColor = 'White' } # Normal '1' { $MessageColor = 'Yellow' } # Info '2' { $MessageColor = 'Magenta'; $Levelstr = 'WARNING' } # Warning '3' { $MessageColor = 'Red'; $LogConsole = $False; $Levelstr = 'ERROR' } # Error '5' { $LogConsole = $False; $Levelstr = 'ERROR' } # ErrorLogFileOnly '6' { $LogConsole = $False; $Levelstr = 'WARNING' } # WarnLogFileOnly '7' { $LogConsole = $False; $Levelstr = 'INFO' } # InfoLogFileOnly } if ($Color) { $MessageColor = $Color } if ($global:msrdLiveDiag) { if ($global:msrdLiveDiagSystem) { $liveDiagBox = $liveDiagPsBoxSystem } elseif ($global:msrdLiveDiagAVDRDS) { $liveDiagBox = $liveDiagPsBoxAVDRDS } elseif ($global:msrdLiveDiagAVDInfra) { $liveDiagBox = $liveDiagPsBoxAVDInfra } elseif ($global:msrdLiveDiagAD) { $liveDiagBox = $liveDiagPsBoxAD } elseif ($global:msrdLiveDiagNet) { $liveDiagBox = $liveDiagPsBoxNet } elseif ($global:msrdLiveDiagLogonSec) { $liveDiagBox = $liveDiagPsBoxLogonSec } elseif ($global:msrdLiveDiagIssues) { $liveDiagBox = $liveDiagPsBoxIssues } elseif ($global:msrdLiveDiagOther) { $liveDiagBox = $liveDiagPsBoxOther } } $Index = 1 # In case of Warning/Error/Debug, add line and function name to message. If ($Level -eq $LogLevel.Error -or $Level -eq $LogLevel.ErrorLogFileOnly -or $Level -eq $LogLevel.Warning -or $Level -eq $LogLevel.WarnLogFileOnly) { $CallStack = Get-PSCallStack $CallerInfo = $CallStack[$Index] $2ndCallerInfo = $CallStack[$Index+1] $3rdCallerInfo = $CallStack[$Index+2] if ($CallerInfo.FunctionName -like "*msrdLogMessage") { $CallerInfo = $2ndCallerInfo } if ($CallerInfo.FunctionName -like "*msrdLogException") { $CallerInfo = $3rdCallerInfo } $FuncName = $CallerInfo.FunctionName If ($FuncName -eq "<ScriptBlock>") { $FuncName = "Main" } if ($global:msrdLangID -eq "AR") { $date = Get-Date $day = $date.Day.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $month = $date.Month.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $year = $date.Year.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $hour = $date.Hour.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $minute = $date.Minute.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $second = $date.Second.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $millisecond = $date.Millisecond.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $datemsg = "${hour}:${minute}:${second}.${millisecond} ${year}/${month}/${day}" } else { $datemsg = (Get-Date).ToString("yyyy/MM/dd HH:mm:ss.fff") } $LogMessage = ($datemsg + ' [' + $FuncName + '(' + $CallerInfo.ScriptLineNumber + ')] ' + $Levelstr + ": " + $Message) # log to warning or error file if ($Level -eq $LogLevel.WarnLogFileOnly -or $Level -eq $LogLevel.Warning) { $LogMessage | Out-File -Append $global:msrdOutputLogFile } else { $LogMessage | Out-File -Append $global:msrdErrorLogFile } } elseif ($Level -eq $LogLevel.InfoLogFileOnly) { if ($global:msrdLangID -eq "AR") { $date = Get-Date $day = $date.Day.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $month = $date.Month.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $year = $date.Year.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $hour = $date.Hour.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $minute = $date.Minute.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $second = $date.Second.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $millisecond = $date.Millisecond.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $datemsg = "${year}/${month}/${day} ${hour}:${minute}:${second}.${millisecond}" } else { $datemsg = (Get-Date).ToString("yyyy/MM/dd HH:mm:ss.fff") } $LogMessage = ($datemsg + ' ' + $Levelstr + ": " + $Message) $LogMessage | Out-File -Append $global:msrdOutputLogFile } else { if($noDate){ $LogMessage = $Message } else { if ($global:msrdLangID -eq "AR") { $date = Get-Date $day = $date.Day.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $month = $date.Month.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $year = $date.Year.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $hour = $date.Hour.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $minute = $date.Minute.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $second = $date.Second.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $millisecond = $date.Millisecond.ToString().Replace('1', '١').Replace('2', '٢').Replace('3', '٣').Replace('4', '٤').Replace('5', '٥').Replace('6', '٦').Replace('7', '٧').Replace('8', '٨').Replace('9', '٩').Replace('0', '٠') $datemsg = "${year}/${month}/${day} ${hour}:${minute}:${second}.${millisecond}" } else { $datemsg = (Get-Date).ToString("yyyy/MM/dd HH:mm:ss.fff") } $LogMessage = $datemsg + " " + $Message } } # percent progress if (($Level -eq $LogLevel.Normal) -or ($Level -eq $LogLevel.Info)) { [decimal]$global:msrdProgress = $global:msrdProgress + $global:msrdProgstep if (!$global:msrdGUI -and !($global:msrdGUIformLite -and $global:msrdGUIformLite.Visible) -and ($global:msrdCollecting -or $global:msrdDiagnosing)) { Write-Progress -Activity "$(msrdGetLocalizedText "collecting1") $global:msrdProgScenario $(msrdGetLocalizedText "collecting2")" -Status "$global:msrdPerc complete:" -PercentComplete $global:msrdProgress } elseif ($global:msrdGUI -or ($global:msrdGUIformLite -and $global:msrdGUIformLite.Visible)) { if (($global:msrdCollecting) -and !($global:msrdDiagnosing)) { $global:msrdProgbar.PerformStep() $global:msrdStatusBarLabel.Text = "$(msrdGetLocalizedText "collecting1") $global:msrdProgScenario $(msrdGetLocalizedText "collecting2")" } elseif ($global:msrdVersioncheck) { $global:msrdStatusBarLabel.Text = msrdGetLocalizedText "checkupd" } if (!($global:msrdCollecting) -and !($global:msrdDiagnosing) -and !($global:msrdVersioncheck)) { $global:msrdStatusBarLabel.Text = msrdGetLocalizedText "Ready" } } } if ($LogConsole) { If ($global:msrdGUI) { if ($global:msrdLiveDiag) { $liveDiagBox.SelectionStart = $liveDiagBox.TextLength $liveDiagBox.SelectionLength = 0 $liveDiagBox.AppendText("$LogMessage`r`n") $liveDiagBox.SelectionStart = $liveDiagBox.TextLength $liveDiagBox.ScrollToCaret() $liveDiagBox.Refresh() } else { $msrdPsBox.SelectionStart = $msrdPsBox.TextLength $msrdPsBox.SelectionLength = 0 $msrdPsBox.SelectionColor = $MessageColor $msrdPsBox.AppendText("$LogMessage`r`n") $msrdPsBox.SelectionStart = $msrdPsBox.TextLength $msrdPsBox.SelectionColor = $MessageColor $msrdPsBox.ScrollToCaret() $msrdPsBox.Refresh() } } else { $host.ui.RawUI.ForegroundColor = $MessageColor Write-Output $LogMessage $host.ui.RawUI.ForegroundColor = $global:msrdConsoleColor } $LogMessage | Out-File -Append $global:msrdOutputLogFile } if (($global:msrdAssistMode -eq 1) -and (($Level -eq $LogLevel.Info) -or $addAssist)) { msrdLogMessageAssistMode $Message } } Function msrdLogMessageAssistMode { param( [ValidateNotNullOrEmpty()][string] $Message ) if ($global:msrdAssistMode -eq 1) { Add-Type -AssemblyName System.Speech; (New-Object System.Speech.Synthesis.SpeechSynthesizer).Speak("$Message") } } Function msrdLogException { param([parameter(Mandatory=$true)][ValidateNotNullOrEmpty()][String]$Message, [parameter(Mandatory=$true)][ValidateNotNullOrEmpty()][System.Management.Automation.ErrorRecord]$ErrObj, [switch]$fErrorLogFileOnly = $false) $ErrorCode = "0x" + [Convert]::ToString($ErrObj.Exception.HResult,16) $ExternalException = [System.ComponentModel.Win32Exception]$ErrObj.Exception.HResult $ErrorMessage = $Message + "`n" ` + "Command/Function: " + $ErrObj.CategoryInfo.Activity + " failed with $ErrorCode => " + $ExternalException.Message + "`n" ` + $ErrObj.CategoryInfo.Reason + ": " + $ErrObj.Exception.Message + "`n" ` + "ScriptStack:" + "`n" ` + $ErrObj.ScriptStackTrace ` + "`n`n" if (-not $global:msrdLiveDiag) { If ($fErrorLogFileOnly) { msrdLogMessage $LogLevel.ErrorLogFileOnly $ErrorMessage } else { msrdLogMessage $LogLevel.Error $ErrorMessage } } } #endregion messages #region progress Function msrdProgressStatusInit { Param( [ValidateNotNullOrEmpty()][int]$divider ) $global:msrdProgress = 1 $global:msrdProgstep = 100/$divider $global:msrdPerc = 1 if ($global:msrdGUI -or ($global:msrdGUIformLite -and $global:msrdGUIformLite.Visible)) { $global:msrdProgbar.Value = 1 $global:msrdProgbar.Minimum = 1 $global:msrdProgbar.Maximum = $divider } } Function msrdProgressStatusEnd { $global:msrdProgress = 100 $global:msrdPerc = 100 } #endregion progress #region versioncheck Function msrdVersionInt($verString) { $verSplit = $verString -split '\.' $vFull = 0 for ($i = 0; $i -lt $verSplit.Count; $i++) { $vFull = ($vFull * 256) + [int]$verSplit[$i] } return $vFull } Function msrdCheckVersion($verCurrent, [switch]$selfUpdate) { $global:aucfail = $false if ($global:msrdGUI) { $global:msrdStatusBarLabel.Text = msrdGetLocalizedText "wait" msrdAdd-OutputBoxLine "$(msrdGetLocalizedText "vercheck1")" } else { msrdLogMessage $LogLevel.Normal "$(msrdGetLocalizedText "vercheck1")" } try { $global:msrdVersioncheck = $true $WebClient = New-Object System.Net.WebClient $verNew = $WebClient.DownloadString('https://cesdiagtools.blob.core.windows.net/windows/MSRD-Collect.ver') $verNew = $verNew.TrimEnd([char]0x0a, [char]0x0d) [long] $lNew = msrdVersionInt($verNew) [long] $lCur = msrdVersionInt($verCurrent) if($lNew -gt $lCur) { if ($global:msrdGUI) { $global:msrdForm.Text = 'MSRD-Collect (v' + $verCurrent + ') - $(msrdGetLocalizedText "vercheck2")' } if ($selfUpdate) { $updnotice = "$(msrdGetLocalizedText "vercheck3") v"+$verNew+" ($(msrdGetLocalizedText "vercheck4") v"+$verCurrent+").`n`n$(msrdGetLocalizedText "vercheck5")`n`n$(msrdGetLocalizedText "selfupdate1")" } else { $updnotice = "$(msrdGetLocalizedText "vercheck3") v"+$verNew+" ($(msrdGetLocalizedText "vercheck4") v"+$verCurrent+").`n`n$(msrdGetLocalizedText "vercheck5")`n`n$(msrdGetLocalizedText "vercheck5b")" } $wshell = New-Object -ComObject Wscript.Shell $answer = $wshell.Popup("$updnotice",0,"$(msrdGetLocalizedText "vercheck6")",4+32) if ($answer -eq 6) { if ($selfUpdate) { $UpdLogFile = $global:msrdScriptpath + "\MSRD-Collect-UpdateLog.txt" $msrdZipFile = Join-Path $env:TEMP 'MSRD-Collect_download.zip' $msrdDownloadUrl = 'https://cesdiagtools.blob.core.windows.net/windows/MSRD-Collect.zip' (Get-Date).ToString("yyyy/MM/dd HH:mm:ss.fff") + " " + "$(msrdGetLocalizedText "selfupdate2") (v$verCurrent -> v$verNew) $(msrdGetLocalizedText "selfupdate3") $env:username`n" | Out-File -Append $UpdLogFile $selfUpdateMsg = "$(msrdGetLocalizedText "selfupdate4")" if ($global:msrdGUI) { msrdAdd-OutputBoxLine $selfUpdateMsg -Color Yellow } else { msrdLogMessage $LogLevel.Info ("$selfUpdateMsg") } (Get-Date).ToString("yyyy/MM/dd HH:mm:ss.fff") + " " + $selfUpdateMsg | Out-File -Append $UpdLogFile Start-BitsTransfer $msrdDownloadUrl -Destination $msrdZipFile -ErrorAction SilentlyContinue | Out-File -Append $UpdLogFile #save current config and update $selfUpdateMsg = "$(msrdGetLocalizedText "selfupdate5") $global:msrdScriptpath\MSRD-Collect.cfg_backup" if ($global:msrdGUI) { msrdAdd-OutputBoxLine $selfUpdateMsg -Color Yellow } else { msrdLogMessage $LogLevel.Info ("$selfUpdateMsg") } (Get-Date).ToString("yyyy/MM/dd HH:mm:ss.fff") + " " + $selfUpdateMsg | Out-File -Append $UpdLogFile Copy-Item ($global:msrdScriptpath + "\MSRD-Collect.cfg") ($global:msrdScriptpath + "\MSRD-Collect.cfg_backup") -Force -ErrorAction SilentlyContinue | Out-File -Append $UpdLogFile $selfUpdateMsg = "$(msrdGetLocalizedText "selfupdate6") $ENV:temp\MSRD-Collect_download.zip" if ($global:msrdGUI) { msrdAdd-OutputBoxLine $selfUpdateMsg -Color Yellow } else { msrdLogMessage $LogLevel.Info ("$selfUpdateMsg") } (Get-Date).ToString("yyyy/MM/dd HH:mm:ss.fff") + " " + $selfUpdateMsg | Out-File -Append $UpdLogFile Expand-archive -LiteralPath $msrdZipFile -DestinationPath $global:msrdScriptpath -Force $selfUpdateMsg = "$(msrdGetLocalizedText "selfupdate7")" if ($global:msrdGUI) { msrdAdd-OutputBoxLine $selfUpdateMsg -Color Yellow } else { msrdLogMessage $LogLevel.Info ("$selfUpdateMsg") } (Get-Date).ToString("yyyy/MM/dd HH:mm:ss.fff") + " " + $selfUpdateMsg | Out-File -Append $UpdLogFile Move-Item ($global:msrdScriptpath + "\MSRD-Collect.cfg_backup") ($global:msrdScriptpath + "\MSRD-Collect.cfg") -Force -ErrorAction SilentlyContinue | Out-File -Append $UpdLogFile $selfUpdateMsg = "$(msrdGetLocalizedText "selfupdate8")" if ($global:msrdGUI) { msrdAdd-OutputBoxLine $selfUpdateMsg -Color Yellow } else { msrdLogMessage $LogLevel.Info ("$selfUpdateMsg") } (Get-Date).ToString("yyyy/MM/dd HH:mm:ss.fff") + " " + $selfUpdateMsg | Out-File -Append $UpdLogFile Remove-Item $msrdZipFile -ErrorAction SilentlyContinue | Out-File -Append $UpdLogFile # Restart the script $selfUpdateMsg = "$(msrdGetLocalizedText "selfupdate9")`n" if ($global:msrdGUI) { msrdAdd-OutputBoxLine $selfUpdateMsg -Color Lightgreen } else { msrdLogMessage $LogLevel.Info ("$selfUpdateMsg") -Color Green } (Get-Date).ToString("yyyy/MM/dd HH:mm:ss.fff") + " " + $selfUpdateMsg + "`n" | Out-File -Append $UpdLogFile $global:msrdCollectcount = 0 try { Start-Process PowerShell.exe -ArgumentList "$global:msrdCmdLine" -NoNewWindow If (($Null -ne $global:msrdTempCommandErrorFile) -and (Test-Path -Path $global:msrdTempCommandErrorFile)) { Remove-Item $global:msrdTempCommandErrorFile -Force | Out-Null } If ($global:fQuickEditCodeExist) { [msrdDisableConsoleQuickEdit]::SetQuickEdit($False) | Out-Null } if ($global:msrdGUI) { $global:msrdForm.Close() } else { Exit } } catch { $failedCommand = $_.InvocationInfo.Line.TrimStart() $errorMessage = $_.Exception.Message.TrimStart() msrdLogException ("$(msrdGetLocalizedText "errormsg") $failedCommand") -ErrObj $_ -fErrorLogFileOnly if ($global:msrdGUI) { msrdAdd-OutputBoxLine -Message "Error in $failedCommand $errorMessage" -Color Magenta } else { msrdLogMessage $LogLevel.Warning ("Error in $failedCommand $errorMessage") } } } else { Write-Output "$(msrdGetLocalizedText "vercheck7")" Start-Process https://aka.ms/MSRD-Collect if (($global:msrdTempCommandErrorFile -ne $null) -and (Test-Path -Path $global:msrdTempCommandErrorFile)) { Remove-Item -Path $global:msrdTempCommandErrorFile -Force -ErrorAction SilentlyContinue } if ($global:fQuickEditCodeExist) { [msrdDisableConsoleQuickEdit]::SetQuickEdit($false) | Out-Null } if ($global:msrdGUI) { $global:msrdForm.Close() } else { Exit } } } else { if ($global:msrdGUI) { msrdAdd-OutputBoxLine ("$(msrdGetLocalizedText "vercheck8")") -Color Yellow } else { msrdLogMessage $LogLevel.Info ("$(msrdGetLocalizedText "vercheck8")") } } } else { if ($global:msrdGUI) { msrdAdd-OutputBoxLine ("$(msrdGetLocalizedText "vercheck9") (v"+$verCurrent+")") -Color Lightgreen } else { msrdLogMessage $LogLevel.Info ("$(msrdGetLocalizedText "vercheck9") (v"+$verCurrent+")") -Color Green } } } catch { $global:aucfail = $true $failedCommand = $_.InvocationInfo.Line.TrimStart() $errorMessage = $_.Exception.Message.TrimStart() if ($global:msrdGUI) { msrdAdd-OutputBoxLine ("Error in $failedCommand $errorMessage") "Magenta" } else { msrdLogMessage $LogLevel.Warning ("Error in $failedCommand $errorMessage") } } msrdProcDumpVerCheck if ($global:aucfail) { $disupd = "Automatic update check failed, possibily due to limited or no internet access.`n`nWould you like to disable automatic update check?`n`nYou can always enabled it again from the Tools menu (Check for Update on launch)." $dushell = New-Object -ComObject Wscript.Shell $duanswer = $dushell.Popup("$disupd",0,"Disable automatic update check",4+48) if ($duanswer -eq 6) { msrdUpdateConfigFile -configFile "MSRD-Collect.cfg" -key "AutomaticVersionCheck" -value 0 $global:msrdAutoVerCheck = 0 if ($global:msrdGUI) { msrdAdd-OutputBoxLine "Automatic update check on script launch is Disabled`n" $global:AutoVerCheckMenuItem.Checked = $false } else { msrdLogMessage $LogLevel.Info ("Automatic update check on script launch is Disabled`n") } } else { msrdUpdateConfigFile -configFile "MSRD-Collect.cfg" -key "AutomaticVersionCheck" -value 1 $global:msrdAutoVerCheck = 1 if ($global:msrdGUI) { msrdAdd-OutputBoxLine "Automatic update check on script launch is Enabled`n" $global:AutoVerCheckMenuItem.Checked = $true } else { msrdLogMessage $LogLevel.Info ("Automatic update check on script launch is Enabled`n") } } } if ($global:msrdGUI) { $global:msrdStatusBarLabel.Text = msrdGetLocalizedText "Ready" } $global:msrdVersioncheck = $false } #endregion versioncheck #region collecting Function msrdTestRegistryValue { param ([parameter(Mandatory=$true)][ValidateNotNullOrEmpty()]$Path, [parameter(Mandatory=$true)][ValidateNotNullOrEmpty()]$Value) try { return (Get-ItemProperty -Path $Path -ErrorAction Stop).$Value -ne $null } catch { return $false } } Function msrdRunCommands { param( [parameter(Mandatory=$true)][ValidateNotNullOrEmpty()]$LogPrefix, [parameter(Mandatory=$true)][ValidateNotNullOrEmpty()]$CmdletArray, [parameter(Mandatory=$true)][Bool]$ThrowException, [parameter(Mandatory=$true)][Bool]$ShowMessage, [parameter(Mandatory=$true)][Bool]$ShowError ) ForEach($CommandLine in $CmdletArray){ # Get file name of output file. This is used later to add command header line. $HasOutFile = $CommandLine -like "*Out-File*" If($HasOutFile){ $OutputFile = $Null $Token = $CommandLine -split ' ' $OutputFileCandidate = $Token[$Token.count-1] # Last token should be output file. If($OutputFileCandidate -match '\.txt' -or $OutputFileCandidate -match '\.log'){ $OutputFile = $OutputFileCandidate $OutputFile = $OutputFile -replace "'","" } } $tmpMsg = $CommandLine -replace " \| Out-File.*$","" -replace " \| Out-Null.*$","" -replace "\-ErrorAction Stop","" -replace "\-ErrorAction SilentlyContinue","" -replace "\-ErrorAction Ignore","" $CmdlineForDisplayMessage = $tmpMsg -replace "' '(.*?)' /y","'" -replace "' '(.*?)' 2>&1","'" -replace " 2>&1","" -replace " --log-file.*$","" -replace " -zip.*$","" Try { If ($ShowMessage) { msrdLogMessage $LogLevel.Normal -LogPrefix $LogPrefix -Message $CmdlineForDisplayMessage } # There are some cases where Invoke-Expression does not reset $global:LASTEXITCODE and $global:LASTEXITCODE has old error value. # Hence we initialize the $global:LASTEXITCODE(PowerShell managed value) if it has error before running command. If($Null -ne $global:LASTEXITCODE -and $global:LASTEXITCODE -ne 0){ $global:LASTEXITCODE = 0 } # Add a header if there is an output file. If ($Null -ne $OutputFile){ "======================================" | Out-File -Append $OutputFile "$((Get-Date).ToString("yyyy/MM/dd HH:mm:ss.fff")) : $CmdlineForDisplayMessage" | Out-File -Append $OutputFile "======================================`n" | Out-File -Append $OutputFile } # Run actual command here. # We redirect all streams to temporary error file as some commands output an error to warning stream(3) and others are to error stream(2). Invoke-Expression -Command $CommandLine -ErrorAction Stop *> $global:msrdTempCommandErrorFile # It is possible $global:LASTEXITCODE becomes null in some sucessful case, so perform null check and examine error code. If ($Null -ne $global:LASTEXITCODE -and $global:LASTEXITCODE -ne 0 -and $global:LASTEXITCODE -ne -2){ # procdump may exit with 0xfffffffe = -2 $Message = "An error happened during running `'$CommandLine` " + '(Error=0x' + [Convert]::ToString($global:LASTEXITCODE,16) + ')' msrdLogMessage $LogLevel.ErrorLogFileOnly $Message If (Test-Path -Path $global:msrdTempCommandErrorFile) { # Always log error to error file. Get-Content $global:msrdTempCommandErrorFile -ErrorAction Ignore | Out-File -Append $global:msrdErrorLogFile # If -ShowError:$True, show the error to console. If ($ShowError) { $host.ui.RawUI.ForegroundColor = "Red" Write-Output "$Message" Write-Output ('---------- ERROR MESSAGE ----------') Get-Content $global:msrdTempCommandErrorFile -ErrorAction Ignore Write-Output ('-----------------------------------') $host.ui.RawUI.ForegroundColor = $global:msrdConsoleColor } } Remove-Item $global:msrdTempCommandErrorFile -Force -ErrorAction Ignore | Out-Null If ($ThrowException) { Throw($Message) } } else { Remove-Item $global:msrdTempCommandErrorFile -Force -ErrorAction Ignore | Out-Null } } Catch { If ($ThrowException) { Throw $_ # Leave the error handling to upper function. } Else { $Message = "An error happened in Invoke-Expression with $CommandLine" msrdLogException ($Message) -ErrObj $_ -fErrorLogFileOnly If ($ShowError){ $host.ui.RawUI.ForegroundColor = "Red" Write-Output ("ERROR: $Message") Write-Output ('---------- ERROR MESSAGE ----------') Write-Output $_ Write-Output ('-----------------------------------') $host.ui.RawUI.ForegroundColor = $global:msrdConsoleColor } Continue } } } } function msrdCollectData { param([bool[]]$varsCore, [bool[]]$varsProfiles, [bool[]]$varsActivation, [bool[]]$varsMSRA, [bool[]]$varsSCard, [bool[]]$varsIME, [bool[]]$varsTeams, [bool[]]$varsMSIXAA, [bool[]]$varsHCI, [bool]$traceNet, [bool]$dumpProc, [int]$pidProc, [switch]$skipDiagCounter = $false) $global:msrdCollecting = $True $global:msrdDiagnosing = $False Import-Module -Name "$global:msrdScriptpath\Modules\MSRDC-CommonsCollect" -DisableNameChecking -Force -Scope Global # init progress indicator $msrdDivider = 1 if ($traceNet) { $msrdDivider++ } if ($true -in $varsCore) { $msrdDivider += 247 } if ($true -in $varsProfiles) { $msrdDivider += 55 } if ($true -in $varsActivation) { $msrdDivider += 3 } if ($true -in $varsMSRA) { $msrdDivider += 9 } if ($true -in $varsSCard) { $msrdDivider += 9 } if ($true -in $varsIME) { $msrdDivider += 36 } if ($true -in $varsTeams) { $msrdDivider += 4 } if ($true -in $varsMSIXAA) { $msrdDivider += 3 } if ($true -in $varsHCI) { $msrdDivider += 5 } if ((-not $global:onlyDiag) -and (-not $skipDiagCounter)) { $msrdDivider += 74 } #diagnostics msrdProgressStatusInit $msrdDivider if ($traceNet) { $global:msrdProgScenario = "Tracing" Import-Module -Name "$global:msrdScriptpath\Modules\MSRDC-Tracing" -DisableNameChecking -Force msrdRunUEX_NetTracing Remove-Module MSRDC-Tracing } if ($true -in $varsCore) { $global:msrdProgScenario = "Core" Import-Module -Name "$global:msrdScriptpath\Modules\MSRDC-Html" -DisableNameChecking -Force -Scope Global Import-Module -Name "$global:msrdScriptpath\Modules\MSRDC-Core" -DisableNameChecking -Force if (-not $global:msrdRDS) { msrdCloseMSRDC } msrdCollectUEX_AVDCoreLog -varsCore $varsCore -dumpProc $dumpProc -pidProc $pidProc Remove-Module MSRDC-Core } if ($true -in $varsProfiles) { $global:msrdProgScenario = "Profiles" Import-Module -Name "$global:msrdScriptpath\Modules\MSRDC-Profiles" -DisableNameChecking -Force msrdCollectUEX_AVDProfilesLog -varsProfiles $varsProfiles Remove-Module MSRDC-Profiles } if ($true -in $varsActivation) { $global:msrdProgScenario = "Activation" Import-Module -Name "$global:msrdScriptpath\Modules\MSRDC-Activation" -DisableNameChecking -Force msrdCollectUEX_AVDActivationLog -varsActivation $varsActivation Remove-Module MSRDC-Activation } if ($true -in $varsMSRA) { $global:msrdProgScenario = "Remote Assistance" Import-Module -Name "$global:msrdScriptpath\Modules\MSRDC-MSRA" -DisableNameChecking -Force msrdCollectUEX_AVDMSRALog -varsMSRA $varsMSRA Remove-Module MSRDC-MSRA } if ($true -in $varsSCard) { $global:msrdProgScenario = "Smart Card" Import-Module -Name "$global:msrdScriptpath\Modules\MSRDC-SCard" -DisableNameChecking -Force msrdCollectUEX_AVDSCardLog -varsSCard $varsSCard Remove-Module MSRDC-SCard } if ($true -in $varsIME) { $global:msrdProgScenario = "IME" Import-Module -Name "$global:msrdScriptpath\Modules\MSRDC-IME" -DisableNameChecking -Force msrdCollectUEX_AVDIMELog -varsIME $varsIME Remove-Module MSRDC-IME } if ($true -in $varsTeams) { $global:msrdProgScenario = "Teams" Import-Module -Name "$global:msrdScriptpath\Modules\MSRDC-Teams" -DisableNameChecking -Force msrdCollectUEX_AVDTeamsLog -varsTeams $varsTeams Remove-Module MSRDC-Teams } if ($true -in $varsMSIXAA) { $global:msrdProgScenario = "MSIX App Attach" Import-Module -Name "$global:msrdScriptpath\Modules\MSRDC-MSIXAA" -DisableNameChecking -Force msrdCollectUEX_AVDMSIXAALog -varsMSIXAA $varsMSIXAA Remove-Module MSRDC-MSIXAA } if ($true -in $varsHCI) { $global:msrdProgScenario = "Azure Stack HCI" Import-Module -Name "$global:msrdScriptpath\Modules\MSRDC-HCI" -DisableNameChecking -Force msrdCollectUEX_AVDHCILog -varsHCI $varsHCI Remove-Module MSRDC-HCI } $global:msrdCollecting = $False msrdLogMessage $LogLevel.Info -Message "$(msrdGetLocalizedText "fdcmsg")`n" -Color "Cyan" if ($skipDiagCounter) { msrdProgressStatusEnd } Remove-Module MSRDC-CommonsCollect [System.GC]::Collect() } Function msrdCollectDataDiag { param ([bool[]]$varsSystem, [bool[]]$varsAVDRDS, [bool[]]$varsInfra, [bool[]]$varsAD, [bool[]]$varsNET, [bool[]]$varsLogSec, [bool[]]$varsIssues, [bool[]]$varsOther) if ($global:onlyDiag) { msrdProgressStatusInit 74 } if (-not (Get-Module -Name MSRDC-Html)) { Import-Module -Name "$global:msrdScriptpath\Modules\MSRDC-Html" -DisableNameChecking -Force -Scope Global } $global:msrdDiagnosing = $True $global:msrdProgScenario = "Diagnostics" Import-Module -Name "$global:msrdScriptpath\Modules\MSRDC-Diag" -DisableNameChecking -Force $parameters = @{ varsSystem = $varsSystem varsAVDRDS = $varsAVDRDS varsInfra = $varsInfra varsAD = $varsAD varsNET = $varsNET varsLogSec = $varsLogSec varsIssues = $varsIssues varsOther = $varsOther } msrdRunUEX_RDDiag @parameters "`n`n" | Out-File -Append $global:msrdOutputLogFile msrdLogMessage $LogLevel.Info "$(msrdGetLocalizedText "fdiagmsg")`n" -Color "Cyan" $global:msrdDiagnosing = $False if ($global:msrdGUI -or ($global:msrdGUIformLite -and $global:msrdGUIformLite.Visible)) { $global:msrdProgbar.Value = $global:msrdProgbar.Maximum; $global:msrdStatusBarLabel.Text = "$(msrdGetLocalizedText "wait")" } Remove-Module MSRDC-Html msrdProgressStatusEnd } Function msrdArchiveData { param( [bool[]]$varsCore ) $mspathnfo = $global:msrdSysInfoLogFolder + $global:msrdLogFilePrefix + "Msinfo32.nfo" $dllpath = $global:msrdSysInfoLogFolder + $global:msrdLogFilePrefix + "System32_DLL.txt" $gpresultpath = $global:msrdSysInfoLogFolder + $global:msrdLogFilePrefix + "Gpresult.html" $powercfgpath = $global:msrdSysInfoLogFolder + $global:msrdLogFilePrefix + "PowerReport.html" $acttime = 0 $waittime = 20000 $maxtime = 180000 $nfoproc = Get-Process msinfo32 -ErrorAction SilentlyContinue if ($global:msrdGUI -or ($global:msrdGUIformLite -and $global:msrdGUIformLite.Visible)) { $global:msrdProgbar.Visible = $false $global:msrdStatusBarLabel.Text = msrdGetLocalizedText "arcmsg" } if (!($global:onlyDiag)) { while ($varsCore[7] -and (!(Test-Path $mspathnfo) -or !(Test-Path $dllpath) -or !(Test-Path $gpresultpath) -or !(Test-Path $powercfgpath) -or ($nfoproc))) { if ($acttime -lt $maxtime) { msrdLogMessage $LogLevel.Normal -Message "$(msrdGetLocalizedText "bgjob1msg")" -Color "White" Start-Sleep -m $waittime $acttime += $waittime $nfoproc = Get-Process msinfo32 -ErrorAction SilentlyContinue } else { msrdLogMessage $LogLevel.Warning -Message "$(msrdGetLocalizedText "bgjob2msg")`n" $nfoproc = Get-Process msinfo32 -ErrorAction SilentlyContinue if ($nfoproc) { $nfoproc.CloseMainWindow() | Out-Null } Start-Sleep 5 if (!$nfoproc.HasExited) { $nfoproc | Stop-Process -Force } Break } } Get-Job | Wait-Job | Remove-Job } $destination = "$global:msrdLogRoot\$msrdLogFolder.zip" msrdLogMessage $LogLevel.Info "$(msrdGetLocalizedText "archmsg")" -Color "Cyan" Try { Add-Type -Assembly 'System.IO.Compression.FileSystem' [System.IO.Compression.ZipFile]::CreateFromDirectory($global:msrdLogDir, $destination) } Catch { $ErrorMessage = "An exception occurred during log folder compression`n" + $_.Exception.Message msrdLogException $ErrorMessage $_ -fErrorLogFileOnly Return } if ($global:msrdGUI -or ($global:msrdGUIformLite -and $global:msrdGUIformLite.Visible)) { $global:msrdStatusBarLabel.Text = msrdGetLocalizedText "Ready" } if (Test-path -path $destination) { if ($global:msrdGUI) { msrdLogMessage $LogLevel.Normal "$(msrdGetLocalizedText "zipmsg") $destination`n" -Color "#00ff00" -addAssist } else { msrdLogMessage $LogLevel.Normal "$(msrdGetLocalizedText "zipmsg") $destination`n" -Color "Green" -addAssist } if ($global:msrdPlaySounds -eq 1) { msrdPlaySystemSound "Windows Logon" } } else { msrdLogMessage $LogLevel.Warning "$(msrdGetLocalizedText "ziperrormsg") $global:msrdLogRoot\$msrdLogFolder`n" -addAssist if ($global:msrdPlaySounds -eq 1) { msrdPlaySystemSound "Windows Exclamation" } } msrdLogMessage $LogLevel.Normal "$(msrdGetLocalizedText "dtmmsg")`n" -Color "White" -addAssist Remove-Module MSRDC-Diag -ErrorAction SilentlyContinue explorer $global:msrdLogRoot if ($global:msrdGUI) { $global:msrdStatusBarLabel.Text = msrdGetLocalizedText "Ready" $global:msrdCollectcount = 1 } [System.GC]::Collect() } function msrdUpdateConfigFile { Param([string]$configFile,[string]$key,[string]$value) $configpath = "$global:msrdScriptpath\$configFile" (Get-Content $configpath) | ForEach-Object { if ($_ -like "$key=*") { $_ = "$key=" + $value } $_ } | Set-Content $configFile } # Function to play a system sound function msrdPlaySystemSound([string]$soundName) { $SoundPath = "C:\Windows\Media\" + $soundName + ".wav" $player = New-Object System.Media.SoundPlayer $player.SoundLocation = $SoundPath $player.Load() $player.Play() } # Function restart function msrdRestart { Write-Host "Display language changed. Restarting script to apply changes.`n" -ForegroundColor Yellow try { Start-Process PowerShell.exe -ArgumentList "$global:msrdCmdLine" -NoNewWindow If (($Null -ne $global:msrdTempCommandErrorFile) -and (Test-Path -Path $global:msrdTempCommandErrorFile)) { Remove-Item $global:msrdTempCommandErrorFile -Force | Out-Null } If ($global:fQuickEditCodeExist) { [msrdDisableConsoleQuickEdit]::SetQuickEdit($False) | Out-Null } if ($global:msrdGUI) { $global:msrdForm.Close() } else { Exit } } catch { $failedCommand = $_.InvocationInfo.Line.TrimStart() $errorMessage = $_.Exception.Message.TrimStart() msrdLogException ("$(msrdGetLocalizedText "errormsg") $failedCommand") -ErrObj $_ -fErrorLogFileOnly if ($global:msrdGUI) { msrdAdd-OutputBoxLine -Message "Error in $failedCommand $errorMessage" -Color Magenta } else { msrdLogMessage $LogLevel.Warning ("Error in $failedCommand $errorMessage") } } } #endregion collecting Export-ModuleMember -Function * # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCATavU23NkzbLDf # 6raI95yZtIwEUsxeyCPYBU9sDO3EpqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILq5Siiyhkk5AWl+j4nhsau6 # N9yf6hzl+gE6qxIFzAFIMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAJZOHFpPJffWKpwTwxW5d7YHw6+lj+jutXkqbfsfS6YPkJ6m1rqBRCwOk # RvVXd7mCYaxFkL4i8hc++hhJOrmGpvbdDiFLFqI9JohDovlTQWY/bfMUelVpSl8N # nobraTo5bhrAegfRc9UviOoCTNygwat6VGEyBfuWBkbDAP880nMrMTKRcM8Q6OEH # IBcqLctXlSGhrCe7B4HjTiFQnxHxTwf42RWLfc9vQ5PgpWPeKCkX41f4h6laVx5k # v73RP8ZJmmtMZoykQHWpG8Etj/yYGTKpLWvq1nN6tsNEiZ/n8WTl+JoyLzXoYN3J # +MXbyIS+M0FXWdygAXJiaSR6O1sRXKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCB95T/G2py/7QoL/DYUOu3mxVnvr7qnhW96YAsjyU+4DQIGZsXn4FOx # GBMyMDI0MDgyOTE2MTMwNS4yNDJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOp68e8wIhgPMjAyNDA4MjkyMTExMTFaGA8yMDI0MDgzMDIxMTExMVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6nrx7wIBADAHAgEAAgIaUDAHAgEAAgIRHjAKAgUA # 6nxDbwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBADpgGK3Oie0bHD1aD+PZ # k67cubH5lDS3vekbRziSbVYDmlLpjfBB5EAfc3aBu4/JAf8fAvEkotpNhMIkpUEm # v3o/hBA3ejzmUYMOV5hLEJ5SLyQ/kXCNYh2dqmbOidGGAo1ZQE0dQRw1mk5gBFTq # pyNyzVRg+6Kz4og5yHC2FzC+MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgXDHZ+j4LCmKV8O6shxpz+tFFbAQiB2dRQvdB2Wycs6gwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEIFej+xgyGHCnEsgOwHyUIrXy2gtoA98cXKP3BefUB6iA # MA0GCSqGSIb3DQEBCwUABIICAJr9MoT4K78FFxC7q6TPrHxtacvMcX0Qp+1zanwA # Eg1qiQpdybV0SvNAjAZnxcUWDWo4tpBIXTYe1WjmwxvC4U/r2Hw/rDigXFyXTSz1 # YCaKZqLNGRU3Af+qFAOl6XMxqh2JJPB2kEDTwwoAuVYuePQBliqkQtpz2ac/TSSe # n3H/T9azn9iavyLGuAcmZ1qPMvbx8pRo7Rnfb7SzY05Fn6d1wzgEohBN3UgoA3Kp # YVA341cYZFwdJvyOEs4D6xUudjRj1uYHumnUAavfh7bS7OjH7i2oBBO8pQKj6QDg # mK7Ew0l5WNWjIvDJdQOYXIPh27fBwW2Tky0EOZGMZgcJ198MnehyrSu74vDtIWhe # UpFAUzjjygrb9PmF70RqapwXv4+Edfm87rkmT8NmvIdcC0mJoCfGQnHGXHJRVAff # GC2vLM/VhOZjHa8w6csrc2WYAmWD2WZDa+p+Q+fUTJy1xQNlQA1+cM14sjR9S99F # nWWxOoyG9xPyTbcRMqswddsOfmjdDzN1xG4uK0WR/nQnw8pAMRHcv0PWKOMVzLUB # /6EM+i+WvNec25Y4vRyVtlZ3zQB8WI6l8aYsAgEHUE+BnfHuoLjKuM/WEpbkV38b # D2av7tiY03Uqm4pnIn3Y/S1Mbv1FCZzRu7Y88rx1XH8F/5s6KswVLlNVpFvtIeuJ # pAYk # SIG # End signature block
combined_dataset/train/non-malicious/sample_47_25.ps1
sample_47_25.ps1
############################################################################### # # Copyright (c) Microsoft Corporation. All rights reserved. # # MBAM Client Deployment # # Version: 2.5.1 # # Purpose: Configure BitLocker drive encryption. # Record recovery keys with MBAM Server. # # Usage: Invoke-MbamClientDeployment # -RecoveryServiceEndpoint <URL> # [-StatusReportingServiceEndpoint <URL>] # [-EncryptionMethod $EncryptionMethod] # [-EncryptAndEscrowDataVolumes] # [-WaitForEncryptionToComplete] # [-IgnoreEscrowOwnerAuthFailure] # [-IgnoreEscrowRecoveryKeyFailure] # [-IgnoreReportStatusFailure] # [-DoNotResumeSuspendedEncryption] # ############################################################################### # This param statement collects values from the command line that will be passed # directly to the function 'Invoke-MbamClientDeployment'. If changes are made to # this parameter list, the 'Invoke-MbamClientDeployment' parameter list must # also be modified. Param( [Parameter(HelpMessage="URL of MBAM recovery service endpoint")][string]$RecoveryServiceEndpoint = $null, [Parameter(HelpMessage="URL of MBAM reporting service endpoint")][string]$StatusReportingServiceEndpoint = $null, [Parameter(HelpMessage="Default is AES128")][string]$EncryptionMethod = "AES128", [switch]$EncryptAndEscrowDataVolumes, [switch]$WaitForEncryptionToComplete, [switch]$IgnoreEscrowOwnerAuthFailure, [switch]$IgnoreEscrowRecoveryKeyFailure, [switch]$IgnoreReportStatusFailure, [switch]$DoNotResumeSuspendedEncryption ) Set-StrictMode -Version 1 # Enum type: EncryptionMethod # The enum values are consistent with the values used by # Win32_EncryptableVolume.Encrypt() WMI method. if (-not ("EncryptionMethod" -as [type])) { Add-Type -TypeDefinition @" public enum EncryptionMethod { UNSPECIFIED = 0, AES128_DIFFUSER = 1, AES256_DIFFUSER = 2, AES128 = 3, AES256 = 4, XTSAES128 = 6, XTSAES256 = 7 } "@ } # Enum type: MbamVolumeType # The enum values are consistent with the values used by Mbam_Volume WMI instances. if (-not ("MbamVolumeType" -as [type])) { Add-Type -TypeDefinition @" public enum MbamVolumeType { UNKNOWN = 0, OS_DRIVE, FIXED_DATA_DRIVE, REMOVABLE_DATA_DRIVE, VIRTUAL_FIXED_DATA_VOLUME } "@ } # Enum type: ProtectoryType # The enum values are consistent with the values used by # Win32_EncryptableVolume.GetKeyProtectorType() WMI method. if (-not ("ProtectorType" -as [type])) { Add-Type -TypeDefinition @" public enum ProtectorType { UNKNOWN_NO_PROTECTOR = 0, TPM_PROTECTOR, EXTERNALKEY_PROTECTOR, NUMERICALPASSWORD_PROTECTOR, TPMPIN_PROTECTOR, TPMKEY_PROTECTOR, TPMPINKEY_PROTECTOR, PUBLICKEY_PROTECTOR, PASSPHRASE_PROTECTOR, TPMCERTIFICATE_PROTECTOR, SID_PROTECTOR, DRA_PROTECTOR = 200 } "@ } # Enum type: ProtectionStatus # The enum values are consistent with the values used by # Win32_EncryptableVolume.GetProtectionStatus() WMI method. if (-not ("ProtectionStatus" -as [type])) { Add-Type -TypeDefinition @" public enum ProtectionStatus { UNPROTECTED = 0, PROTECTED, UNKNOWN } "@ } # Enum type: ConversionStatus # The enum values are consistent with the values used by # Win32_EncryptableVolume.GetConversionStatus() WMI method. if (-not ("ConversionStatus" -as [type])) { Add-Type -TypeDefinition @" public enum ConversionStatus { FULLY_DECRYPTED = 0, FULLY_ENCRYPTED, ENCRYPTION_IN_PROGRESS, DECRYPTION_IN_PROGRESS, ENCRYPTION_PAUSED, DECRYPTION_PAUSED } "@ } # WMI constants if (-not (Test-Path variable:local:TpmWmiNamespace)) { Set-Variable TpmWmiNamespace -Option ReadOnly -Scope local "root\CIMV2\Security\MicrosoftTpm" } if (-not (Test-Path variable:local:BitLockerWmiNamespace)) { Set-Variable BitLockerWmiNamespace -Option ReadOnly -Scope local "root\CIMV2\Security\MicrosoftVolumeEncryption" } if (-not (Test-Path variable:local:MbamWmiNamespace)) { Set-Variable MbamWmiNamespace -Option ReadOnly -Scope local "root\Microsoft\MBAM" } # Retry constants for escrowing TPM owner-auth and volume recovery key to MBAM server. # Mumber of tries: 3 # Retry interval: 30 seconds if (-not (Test-Path variable:local:NumEscrowTries)) { Set-Variable NumEscrowTries -Option ReadOnly -Scope local 3 } if (-not (Test-Path variable:local:EscrowRetryInterval)) { Set-Variable EscrowRetryInterval -Option ReadOnly -Scope local 30 # in seconds } # HRESULT Constants if (-not (Test-Path variable:local:S_OK)) { Set-Variable S_OK -Option ReadOnly -Scope local ([uint32]"0x0") Set-Variable MBAM_E_TPM_NOT_PRESENT -Option ReadOnly -Scope local ([uint32]"0x80040200") Set-Variable MBAM_E_TPM_INCORRECT_STATE -Option ReadOnly -Scope local ([uint32]"0x80040201") Set-Variable MBAM_E_TPM_AUTO_PROVISIONING_PENDING -Option ReadOnly -Scope local ([uint32]"0x80040202") Set-Variable MBAM_E_TPM_OWNERAUTH_READFAIL -Option ReadOnly -Scope local ([uint32]"0x80040203") Set-Variable MBAM_E_REBOOT_REQUIRED -Option ReadOnly -Scope local ([uint32]"0x80040204") Set-Variable MBAM_E_SHUTDOWN_REQUIRED -Option ReadOnly -Scope local ([uint32]"0x80040205") Set-Variable FVE_E_LOCKED_VOLUME -Option ReadOnly -Scope local ([uint32]"0x80310000") Set-Variable FVE_E_NOT_ACTIVATED -Option ReadOnly -Scope local ([uint32]"0x80310008") Set-Variable FVE_E_PROTECTOR_NOT_FOUND -Option ReadOnly -Scope local ([uint32]"0x80310033") Set-Variable FVE_E_VOLUME_TOO_SMALL -Option ReadOnly -Scope local ([uint32]"0x8031006F") Set-Variable WS_E_INVALID_FORMAT -Option ReadOnly -Scope local ([uint32]"0x803D0000") Set-Variable WS_E_ENDPOINT_ACCESS_DENIED -Option ReadOnly -Scope local ([uint32]"0x803D0005") Set-Variable WS_E_ENDPOINT_NOT_FOUND -Option ReadOnly -Scope local ([uint32]"0x803D000D") Set-Variable WS_E_ENDPOINT_FAILURE -Option ReadOnly -Scope local ([uint32]"0x803D000F") Set-Variable WS_E_ENDPOINT_UNREACHABLE -Option ReadOnly -Scope local ([uint32]"0x803D0010") Set-Variable WS_E_ENDPOINT_TOO_BUSY -Option ReadOnly -Scope local ([uint32]"0x803D0012") Set-Variable WS_E_ENDPOINT_FAULT_RECEIVED -Option ReadOnly -Scope local ([uint32]"0x803D0013") Set-Variable WS_E_INVALID_ENDPOINT_URL -Option ReadOnly -Scope local ([uint32]"0x803D0020") } # Exit code constants if (-not (Test-Path variable:local:BDEHDCFG_E_BDECFG_READY_FOR_BITLOCKER)) { Set-Variable BDEHDCFG_E_BDECFG_READY_FOR_BITLOCKER -Option ReadOnly -Scope local ([int32]"0xC0A00002") } # HRESULT to error message mapping if (-not (Test-Path variable:local:HresultToString)) { Set-Variable HresultToString -Option ReadOnly -Scope local @{ $S_OK = "The method was successful."; $MBAM_E_TPM_NOT_PRESENT = "TPM is not present in the machine or disabled in BIOS configuration."; $MBAM_E_TPM_INCORRECT_STATE = "TPM is not in the correct state (enabled, activated and owner installation allowed)."; $MBAM_E_TPM_AUTO_PROVISIONING_PENDING = "MBAM cannot take the ownership of TPM because auto-provisioning is pending. Try again after the auto-provisioning is completed."; $MBAM_E_TPM_OWNERAUTH_READFAIL = "MBAM cannot read the TPM owner authorization value. The value may have been removed after a successful escrow. On Windows 7, MBAM cannot read the value if the TPM is owned by others."; $MBAM_E_REBOOT_REQUIRED = "The computer must be restarted to set TPM in the correct state. Physical presence may be required."; $MBAM_E_SHUTDOWN_REQUIRED = "The computer must be shutdown and turned back on to set TPM in the correct state. Physical presence may be required."; $FVE_E_LOCKED_VOLUME = "The volume is locked."; $FVE_E_NOT_ACTIVATED = "BitLocker is not enabled on the volume. Add a key protector to enable BitLocker."; $FVE_E_PROTECTOR_NOT_FOUND = "Numerical Password protector was not found for the volume."; $FVE_E_VOLUME_TOO_SMALL = "The drive is too small to be protected using BitLocker Drive Encryption."; $WS_E_INVALID_FORMAT = "The input data was not in the expected format or did not have the expected value."; $WS_E_ENDPOINT_ACCESS_DENIED = "Access was denied by the remote endpoint."; $WS_E_ENDPOINT_NOT_FOUND = "The remote endpoint does not exist or could not be located."; $WS_E_ENDPOINT_FAILURE = "The remote endpoint could not process the request."; $WS_E_ENDPOINT_UNREACHABLE = "The remote endpoint was not reachable."; $WS_E_ENDPOINT_TOO_BUSY = "The remote endpoint is unable to process the request due to being overloaded."; $WS_E_ENDPOINT_FAULT_RECEIVED = "A message containing a fault was received from the remote endpoint. Ensure that you are connecting to the connect service endpoint." $WS_E_INVALID_ENDPOINT_URL = "The endpoint address URL is not valid. The URL must start with 'http' or 'https'."; $BDEHDCFG_E_BDECFG_READY_FOR_BITLOCKER = "This computer's hard drive is properly configured for BitLocker. It is not necessary to run BitLocker Setup." } } Function GetMbamWmiErrorMessage($HResult) { <# .SYNOPSIS Convert an HRESULT into a string. .DESCRIPTION Attempts to convert an HRESULT into a string. If not able, the HRESULT is returned as a HEX formatted string. .PARAMETER HResult HResult to convert. #> if ($hResult) { [uint32]$hResult = $hResult; [string]$hexval = "0x{0:x}" -f $hResult if ($HresultToString.Contains($hResult)) { return " HRESULT: $hexval - " + ($HresultToString[$hResult]); } else { return " HRESULT: $hexval" } } else { return [string]"" } } Function ReportStatus() { <# .SYNOPSIS Report the encryption and compliance status. .DESCRIPTION Report the encryption and compliance status to the provided MBAM reporting service endpoint. .PARAMETER ReportingServiceEndpoint MBAM reporting service endpoint. .PARAMETER IgnoreError If set, it will just write a warning instead of throwing an exception on WMI method error. .RETURNVALUE HRESULT returned by the Mbam_Machine.ReportStatus() WMI method being called. #> Param( [Parameter(Mandatory=$True)][string]$ReportingServiceEndpoint, [switch]$IgnoreError ) Write-Debug "ReportStatus ReportingServiceEndpoint=$ReportingServiceEndpoint $IgnoreError=$IgnoreError" # Call WMI method Mbam_Machine.ReportStatus() [psobject]$mbamMachine = Get-WmiObject -Query ("SELECT * FROM Mbam_Machine") -Namespace $MbamWmiNamespace if ($mbamMachine -eq $Null) { Throw "WMI query to Mbam_Machine failed." } Try { [psobject]$obj = $mbamMachine.ReportStatus($ReportingServiceEndpoint) } Catch [system.object] { Throw "Failed to execute WMI Mbam_Machine.ReportStatus. Make sure MBAM client is 2.5 SP1 or greater." } [uint32]$hResult = $obj.ReturnValue if (($hResult -ne $S_OK)) { [string]$message = ("Failed to report the encryption and compliance status. " + (GetMbamWmiErrorMessage $hResult)) # If the error can be ignored just write a warning, otherwise write an error and throw. if ($IgnoreError) { Write-Host $message } else { Throw $message } } Write-Debug "ReportStatus: Return $hResult" return $hResult; } Function PrepareTpmAndEscrowOwnerAuth() { <# .SYNOPSIS Prepare TPM and escrow TPM owner-auth. .DESCRIPTION Prepare TPM and escrow TPM owner-auth to the provided MBAM recovery service endpoint. It will try to set TPM to the correct state (enabled, activated and TPM owner installation allowed) if not so. It will take the ownership of TPM if it is not owned and not configured to be auto-provisioned. It will fail if TPM is not owned but configured to be auto-provisioned. .PARAMETER RecoveryServiceEndpoint MBAM recovery service endpoint. .PARAMETER IgnoreEscrowOwnerAuthFailure If set, it will just write a warning instead of throwing an exception on TPM owner-auth escrow errors. The TPM preparation errors will block encryption and are hence considered fatal. .RETURNVALUE HRESULT returned by the Mbam_Machine.PrepareTpmAndEscrowOwnerAuth() WMI method being called. #> Param( [Parameter(Mandatory=$True)][string]$RecoveryServiceEndpoint, [switch]$IgnoreEscrowOwnerAuthFailure ) Write-Debug "PrepareTpmAndEscrowOwnerAuth RecoveryServiceEndpoint=$RecoveryServiceEndpoint IgnoreEscrowOwnerAuthFailure=$IgnoreEscrowOwnerAuthFailure" # Call WMI method Mbam_Machine.PrepareTpmAndEscrowOwnerAuth() [psobject]$mbamMachine = Get-WmiObject -Query ("SELECT * FROM Mbam_Machine") -Namespace $MbamWmiNamespace if ($mbamMachine -eq $Null) { Throw "WMI query to Mbam_Machine failed." } [int]$numTried = 0 [uint32]$hResult = $S_OK do { [psobject]$obj = $mbamMachine.PrepareTpmAndEscrowOwnerAuth($RecoveryServiceEndpoint) if ($obj -eq $null) { Throw "Failed to execute WMI Mbam_Machine.PrepareTpmAndEscrowOwnerAuth. Make sure MBAM client is 2.5 SP1 or greater." } ++$numTried $hResult = $obj.ReturnValue if ($hResult -ne $S_OK) { if (($hResult -eq $MBAM_E_TPM_NOT_PRESENT) -or ($hResult -eq $MBAM_E_TPM_INCORRECT_STATE) -or ($hResult -eq $MBAM_E_TPM_AUTO_PROVISIONING_PENDING)) # TPM preparation errors { Throw "Failed to prepare TPM for encryption." + (GetMbamWmiErrorMessage $hResult) } elseif ($numTried -lt $NumEscrowTries) { Write-Host ("Failed to escrow TPM owner-auth to $RecoveryServiceEndpoint." + (GetMbamWmiErrorMessage $hResult)) Write-Host ("Retry after $EscrowRetryInterval seconds...") Start-Sleep -s $EscrowRetryInterval } } } while (($hResult -ne $S_OK) -and ($numTried -lt $NumEscrowTries)) if ($hResult -ne $S_OK) { $message = ("Failed to escrow TPM owner-auth to $RecoveryServiceEndpoint after $NumEscrowTries tries. Last error - " + (GetMbamWmiErrorMessage $hResult)) if ($IgnoreEscrowOwnerAuthFailure) { Write-Host $message Write-Host "The TPM owner-auth escrow failures are configured to be ignored." } else { Throw $message } } Write-Debug "PrepareTpmAndEscrowOwnerAuth: Return $hResult" return $hResult; } Function EscrowVolumeRecoveryInfo() { <# .SYNOPSIS Escrow volume recovery information. .DESCRIPTION Escrow volume recovery information to the provided MBAM recovery service endpoint. .PARAMETER RecoveryServiceEndpoint MBAM recovery service endpoint. .PARAMETER DeviceId Device ID of the volume whose recovery info will be escrowed. .PARAMETER IgnoreError If set, it will just write a warning instead of throwing an exception on WMI method error. .RETURNVALUE HRESULT returned by the Machine_Volume.EscrowRecoveryInfo() WMI method being called. #> Param( [Parameter(Mandatory=$True)][string]$RecoveryServiceEndpoint, [Parameter(Mandatory=$True)][string]$DeviceId, [switch]$IgnoreError ) Write-Debug("EscrowVolumeRecoveryInfo RecoveryServiceEndpoint=$RecoveryServiceEndpoint " + "DeviceId=$DeviceId IgnoreError=$IgnoreError") # Call WMI method Machine_Volume.EscrowRecoveryInfo() on the device [string]$id = (EscapeWmiString $DeviceId) [psobject]$mbamVolume = Get-WmiObject -Query ("SELECT * FROM Mbam_Volume WHERE DeviceId = '$id'") -Namespace $MbamWmiNamespace if ($mbamVolume -eq $Null) { Throw "Mbam_Volume WMI lookup failed to find device $DeviceId." } # To overcome possible connectivity issues, try to connect to the MBAM service serveral times in case of error. [int]$numTried = 0 [uint32]$hResult = $S_OK do { [psobject]$obj = $mbamVolume.EscrowRecoveryKey($RecoveryServiceEndpoint) if ($obj -eq $null) { Throw "Failed to execute WMI Mbam_Volume.EscrowRecoveryKey. Make sure MBAM client is 2.5 SP1 or greater." } ++$numTried $hResult = $obj.ReturnValue if (($hResult -ne $S_OK) -and ($numTried -lt $NumEscrowTries)) { $driveLetter = $mbamVolume.DriveLetter Write-Host ("Failed to escrow the recovery information of volume $driveLetter (Device ID: $DeviceId) to $RecoveryServiceEndpoint." + (GetMbamWmiErrorMessage $hResult)) Write-Host ("Retry after $EscrowRetryInterval seconds...") Start-Sleep -s $EscrowRetryInterval } } while (($hResult -ne $S_OK) -and ($numTried -lt $NumEscrowTries)) if ($hResult -ne $S_OK) { $driveLetter = $mbamVolume.DriveLetter $message = ("Failed to escrow the recovery information of volume $driverLetter (Device ID: $DeviceId) to $RecoveryServiceEndpoint after $NumEscrowTries tries. Last error - " + (GetMbamWmiErrorMessage $hResult)) if ($IgnoreError) { Write-Host $message Write-Host "The volume recovery information escrow failures are configured to be ignored." } else { throw $message } } Write-Debug "EscrowVolumeRecoveryInfo: Return $hResult" return $hResult; } Function IsProtectorPresent() { <# .SYNOPSIS Check if a specified type of key protector is present in the specified volume. .DESCRIPTION Check if a specified type of key protector is present in the specified volume. .PARAMETER DeviceId DeviceId of the volume to check. .PARAMETER ProtectorType Key protector type to check. If not specified, all protector types will be checked. .RETURNVALUE True if a specified type of protector is present, False otherwise. #> Param( [Parameter(Mandatory=$True)][string]$DeviceId, [ProtectorType]$ProtectorType ) Write-Debug "IsProtectorPresent DeviceId=$DeviceId ProtectorType=$ProtectorType" # If protector type is not specified, any protector will be looked up. if ($ProtectorType -eq $null) { $ProtectorType = [ProtectorType]::UNKNOWN_NO_PROTECTOR } [psobject]$volume = GetEncryptableVolume -DeviceId $deviceId [psobject]$keyProtectorsObj = $volume.GetKeyProtectors(($ProtectorType -as [int])) [uint32]$hResult = $keyProtectorsObj.ReturnValue [string[]]$protectors = $keyProtectorsObj.VolumeKeyProtectorID if (($hResult -ne $S_OK)) { Throw "Failed to determine whether device $DeviceId has a $ProtectorType protector." } [uint32]$retval = ($protectors.Count -gt 0) Write-Debug "IsProtectorPresent: Return $retval" return $retval } Function IsTpmProtectorPresent() { <# .SYNOPSIS Check if any TPM key protector is present in the specified volume. .DESCRIPTION Check if any TPM key protector is present in the specified volume. .PARAMETER DeviceId The DeviceId of the volume to check. .RETURNVALUE True if any TPM key protector is present, False otherwise. #> Param([Parameter(Mandatory=$True)][string]$DeviceId) Write-Debug "IsTpmProtectorPresent DeviceId=$DeviceId" [bool]$retval = ` (IsProtectorPresent -DeviceId $DeviceId -ProtectorType ([ProtectorType]::TPM_PROTECTOR)) -or ` (IsProtectorPresent -DeviceId $DeviceId -ProtectorType ([ProtectorType]::TPMPIN_PROTECTOR)) -or ` (IsProtectorPresent -DeviceId $DeviceId -ProtectorType ([ProtectorType]::TPMKEY_PROTECTOR)) -or ` (IsProtectorPresent -DeviceId $DeviceId -ProtectorType ([ProtectorType]::TPMPINKEY_PROTECTOR)) Write-Debug "IsTpmProtectorPresent: Return $retval" return $retval } Function IsAutoUnlockProtectorPresent() { <# .SYNOPSIS Check if Auto-unlock key protector is present in the specified volume. .DESCRIPTION Check if Auto-unlock key protector is present in the specified volume. .PARAMETER DeviceId DeviceId of the volume to check. .RETURNVALUE True if Auto-unlock key protector is present, False otherwise. #> Param([Parameter(Mandatory=$True)][string]$DeviceId) Write-Debug "IsAutoUnlockProtectorPresent DeviceId=$DeviceId" [psobject]$volume = GetEncryptableVolume -DeviceId $deviceId [psobject]$obj = $volume.IsAutoUnlockEnabled() [uint32]$hresult = $obj.ReturnValue [bool]$retval = $obj.IsAutoUnlockEnabled if (($hresult -ne $S_OK)) { Throw "Failed to get the Auto-unlock protector enablement status of volume $DeviceId." + (GetMbamWmiErrorMessage $hResult) } Write-Debug "IsAutoUnlockProtectorPresent: Return $retval" return $retval } Function IsEncryptionNeeded() { <# .SYNOPSIS Check if encryption is needed for the given drive. .DESCRIPTION It returns $True if 1) the volume is decrypted or being decrypted, or 2) the volume is encryption paused and the -DoNotResumeSuspendedEncryption flag is not set, 3) the volume is encrypted but the protectors are not enabled. It throws an exception if the protection status of the volume cannot be determined. .PARAMETER DeviceId The device ID of the volume to check. .PARAMETER DoNotResumeSuspendedEncryption If present, suspended encryption will not be resumed. .RETURNVALUE True if a volume protector is turned on, False otherwise. #> Param( [Parameter(Mandatory=$True)][string]$DeviceId, [switch]$DoNotResumeSuspendedEncryption ) Write-Debug("IsEncryptionNeeded DeviceId=$DeviceId DoNotResumeSuspendedEncryption=$DoNotResumeSuspendedEncryption") [psobject]$volume = GetEncryptableVolume -DeviceId $deviceId [psobject]$conversionStatusObj = $volume.GetConversionStatus() [uint32]$hResult = $conversionStatusObj.ReturnValue [ConversionStatus]$conversionStatus = $conversionStatusObj.ConversionStatus if (($hResult -ne $S_OK)) { Throw "Failed to get the conversion status of volume $DeviceId." + (GetMbamWmiErrorMessage $hResult) } [bool]$retval = $False if ($conversionStatus -eq [ConversionStatus]::FULLY_DECRYPTED) { Write-Host "Device $DeviceId is fully decrypted. Encryption will be started." $retval = $True } elseif ($conversionStatus -eq [ConversionStatus]::DECRYPTION_IN_PROGRESS) { Write-Host "Device $DeviceId has decryption in progress. Encryption will be started." $retval = $True } elseif ($conversionStatus -eq [ConversionStatus]::FULLY_ENCRYPTED) { if ((GetProtectionStatus -DeviceId $deviceId) -eq [ProtectionStatus]::UNPROTECTED) { Write-Host "Device $DeviceId is already encrypted but not protected. The key protectors will be enabled." $retval = $True } else { Write-Host "Device $DeviceId is already encrypted and protected." } } elseif ($conversionStatus -eq [ConversionStatus]::ENCRYPTION_IN_PROGRESS) { Write-Host "Device $DeviceId is already encrypting." } elseif ($conversionStatus -eq [ConversionStatus]::ENCRYPTION_PAUSED) { if ($DoNotResumeSuspendedEncryption) { Write-Host "Device $DeviceId has encryption paused. State will not be changed." } else { Write-Host "Device $DeviceId has encryption paused. Encryption will be resumed." $retval = $True } } elseif ($conversionStatus -eq [ConversionStatus]::DECRYPTION_PAUSED) { Write-Host "Device $DeviceId has decryption paused. State will not be changed." } else { Write-Host ("Conversion status of volume $DeviceId is " + ($conversionStatus -as [string])) } Write-Debug "IsEncryptionNeeded: Return $retval" return $retval; } Function AddNumericalPasswordProtectorToVolume() { <# .SYNOPSIS Add Numerical Password key protector to the specified volume. .DESCRIPTION Add Numerical Password key protector to the specified volume. .PARAMETER DeviceId Device ID of the volume to check. #> Param([Parameter(Mandatory=$True)][string]$DeviceId) Write-Debug "AddNumericalPasswordProtectorToVolume DeviceId=$DeviceId" [psobject]$volume = GetEncryptableVolume -DeviceId $deviceId [uint32]$hResult = $volume.ProtectKeyWithNumericalPassword().ReturnValue if (($hResult -ne $S_OK)) { [string]$message = ("Failed to add Numerical Password protector to device $DeviceId." + (GetMbamWmiErrorMessage $hResult)) if ($hResult -eq $FVE_E_VOLUME_TOO_SMALL) { $message = "Device $DeviceId is too small to be protected using BitLocker Drive Encryption." } Throw $message } Write-Debug "AddNumericalPasswordProtectorToVolume: Returned from function" } Function GetOsDeviceId() { <# .SYNOPSIS Gets the device ID of OS drive. .DESCRIPTION Gets the device ID of the OS drive. An exception is thrown on failure. .RETURNVALUE As string containing the OS device id. #> Write-Debug "GetOsDeviceId" [int]$volumeType = [MbamVolumeType]::OS_DRIVE [psobject]$volume = Get-WmiObject -Query ("SELECT * FROM Mbam_Volume WHERE BitLockerManagementVolumeType = '$volumeType'") -Namespace $MbamWmiNamespace if ($volume -eq $null) { Throw "Failed to find the OS device." } [string]$deviceId = $volume.DeviceId return $deviceId } Function AddTpmProtectorToOsVolume() { <# .SYNOPSIS Add key protector to OS volume. .DESCRIPTION Add TPM key protector to OS volume if it has compatible TPM. #> Write-Debug "AddTpmProtectorToOsVolume" [string]$deviceId = GetOsDeviceId [psobject]$volume = GetEncryptableVolume -DeviceId $deviceId [uint32]$hResult = $volume.ProtectKeyWithTPM().ReturnValue if (($hResult -ne $S_OK)) { Throw "Failed to add TPM protector to OS device $deviceId." + (GetMbamWmiErrorMessage $hResult) } Write-Debug "AddTpmProtectorToOsVolume: Returning from function" } Function AddAutoUnlockProtectorToDataVolume() { <# .SYNOPSIS Add key protector to the specified data volume. .DESCRIPTION Add an external key protector to the specified data volume and enable auto-unlock. .PARAMETER DeviceId The DeviceId of the data volume to add protector to. #> Param([Parameter(Mandatory=$True)][string]$DeviceId) Write-Debug "AddAutoUnlockProtectorToDataVolume DeviceId=$DeviceId" [bool]$enabled = IsAutoUnlockProtectorPresent -DeviceId $deviceId if ($enabled) # return immediately if auto-unlock already enabled { Write-Host "AddAutoUnlockProtectorToDataVolume: Auto-unlock is already enabled on data volume $DeviceId." return } # Call Win32_EncryptableVolume.ProtectKeyWithExternalKey() WMI method to add an external key protector. [psobject]$volume = GetEncryptableVolume -DeviceId $deviceId [psobject]$obj = $volume.ProtectKeyWithExternalKey() [uint32]$hResult = $obj.ReturnValue $protectorID = $obj.VolumeKeyProtectorID if (($hResult -ne $S_OK)) { Throw "Failed to add an external key protector to data volume $DeviceId." + (GetMbamWmiErrorMessage $hResult) } # Call Win32_encryptablevolume.EnableAutoUnlock() WMI method to enable auto-unlock. [uint32]$hResult = $volume.EnableAutoUnlock($protectorID).ReturnValue if (($hResult -ne $S_OK)) { Throw "Failed to enable auto-unlock on data volume $DeviceId." + (GetMbamWmiErrorMessage $hResult) } Write-Debug "AddAutoUnlockProtectorToDataVolume: Returning from function" } Function StartEncrypting() { <# .SYNOPSIS Start encrypting the specified volume. .DESCRIPTION Start encrypting the specified volume asynchronously. .PARAMETER DeviceId The device ID of the volume to be encrypted. .PARAMETER EncryptionMethod Encryption method. #> Param( [Parameter(Mandatory=$True)][string]$DeviceId, [Parameter(Mandatory=$True)][EncryptionMethod]$EncryptionMethod ) Write-Debug "StartEncrypting DeviceId=$DeviceId EncryptionMethod=$EncryptionMethod" # Start encrypting. Does not wait for completion. [psobject]$volume = GetEncryptableVolume -DeviceId $deviceId [uint32]$hResult = $volume.Encrypt($EncryptionMethod).ReturnValue if (($hResult -ne $S_OK)) { Throw "Failed to start encrypting volume $DeviceId." + (GetMbamWmiErrorMessage $hResult) } Write-Debug "StartEncrypting: Returning from function" } Function EnableKeyProtectors() { <# .SYNOPSIS Enable the key protectors of the specified volume. .DESCRIPTION Enable the key protectors of the specified volume. This ensures that the volume's encryption key is not exposed in the clear on the hard disk. .PARAMETER DeviceId The device ID of the volume whose protectors will be enabled. #> Param([Parameter(Mandatory=$True)][string]$DeviceId) Write-Debug "EnableKeyProtectors DeviceId=$DeviceId" [psobject]$volume = GetEncryptableVolume -DeviceId $deviceId [uint32]$hResult = $volume.EnableKeyProtectors().ReturnValue if (($hResult -ne $S_OK)) { Throw "Failed to enable the key protectors of the volume $DeviceId." + (GetMbamWmiErrorMessage $hResult) } Write-Debug "EnableKeyProtectors: Returning from function" } Function GetProtectionStatus() { <# .SYNOPSIS Get the protection status of the specified volume. .DESCRIPTION Get the protection status of the specified volume. .PARAMETER DeviceId The device ID of the volume whose protection status will be obtained. .RETURNVALUE The protection status of the specified volume. #> Param([Parameter(Mandatory=$True)][string]$DeviceId) Write-Debug "GetProtectionStatus DeviceId=$DeviceId" [psobject]$volume = GetEncryptableVolume -DeviceId $deviceId [psobject]$protectionStatusObj = $volume.GetProtectionStatus() [uint32]$hResult = $protectionStatusObj.ReturnValue [ProtectionStatus]$protectionStatus = $protectionStatusObj.ProtectionStatus if ($hResult -ne $S_OK) { Throw "Failed to get the protection status of volume $DeviceId." + (GetMbamWmiErrorMessage $hResult) } Write-Debug "GetProtectionStatus: Returning $protectionStatus" return $protectionStatus } Function EncryptAndEscrowOsVolume() { <# .SYNOPSIS Encrypt the OS volume and enable the protectors. .DESCRIPTION Add numerical protector if not present on the OS device, Escrow the recovery key with MBAM and start encrypting the device. .PARAMETER EncryptionMethod Encryption method. .PARAMETER RecoveryServiceEndpoint MBAM recovery service endpoint. .PARAMETER IgnoreEscrowRecoveryKeyFailure If not present, failure to escrow recovery key will throw an exception. .PARAMETER DoNotResumeSuspendedEncryption If present, suspended encryption will not be resumed. .RETURNVALUE An array containing the drive letter of the OS drive. #> Param( [Parameter(Mandatory=$True)][EncryptionMethod]$EncryptionMethod, [Parameter(Mandatory=$True)][string]$RecoveryServiceEndpoint, [switch]$IgnoreEscrowRecoveryKeyFailure, [switch]$DoNotResumeSuspendedEncryption ) Write-Debug("EncryptAndEscrowOsVolume EncryptionMethod=$EncryptionMethod " + "RecoveryServiceEndpoint=$RecoveryServiceEndpoint " + "IgnoreEscrowRecoveryKeyFailure=$IgnoreEscrowRecoveryKeyFailure" + "DoNotResumeSuspendedEncryption=$DoNotResumeSuspendedEncryption") [string]$deviceId = GetOsDeviceId if (-not (IsProtectorPresent -DeviceId $deviceId -ProtectorType NUMERICALPASSWORD_PROTECTOR)) { AddNumericalPasswordProtectorToVolume -DeviceId $deviceId } [uint32]$hResult = EscrowVolumeRecoveryInfo ` -RecoveryServiceEndpoint $RecoveryServiceEndpoint ` -DeviceId $deviceId ` -IgnoreError:$IgnoreEscrowRecoveryKeyFailure if (IsEncryptionNeeded -DeviceId $deviceId -DoNotResumeSuspendedEncryption:$DoNotResumeSuspendedEncryption) { StartEncrypting -EncryptionMethod $EncryptionMethod -DeviceId $deviceId EnableKeyProtectors -DeviceId $deviceId } Write-Debug("EncryptAndEscrowOsVolume: Return " + @($deviceId) | Out-String) return @($deviceId) } Function EncryptAndEscrowDataVolumes() { <# .SYNOPSIS Encrypt data volumes and enable the protectors. .DESCRIPTION Adds numerical protectors if not present on the data drives, escrows the recovery keys and start encryption on the volumes. .PARAMETER EncryptionMethod Encryption method. .PARAMETER RecoveryServiceEndpoint MBAM recovery service endpoint. .PARAMETER $IgnoreEscrowRecoveryKeyFailure If not present, failure to escrow recovery key will throw an exception. .PARAMETER DoNotResumeSuspendedEncryption If present, suspended encryption will not be resumed. .RETURNVALUE An array containing the device IDs being encrypted. #> Param( [Parameter(Mandatory=$True)][EncryptionMethod]$EncryptionMethod, [Parameter(Mandatory=$True)][string]$RecoveryServiceEndpoint, [switch]$IgnoreEscrowRecoveryKeyFailure, [switch]$DoNotResumeSuspendedEncryption ) Write-Debug("EncryptAndEscrowDataVolumes EncryptionMethod=$EncryptionMethod " + "RecoveryServiceEndpoint=$RecoveryServiceEndpoint " + "IgnoreEscrowRecoveryKeyFailure=$IgnoreEscrowRecoveryKeyFailure" + "DoNotResumeSuspendedEncryption=$DoNotResumeSuspendedEncryption") [system.array]$DevicesToEncrypt = @() [int]$fixedVolumeType = [MbamVolumeType]::FIXED_DATA_DRIVE [system.array]$volumes = Get-WmiObject -Query ("SELECT * FROM MBAM_Volume WHERE BitLockerManagementVolumeType = $fixedVolumeType") -Namespace $MbamWmiNamespace if ($volumes -ne $null) { foreach ($volume in $volumes) { [string]$deviceId = $volume.DeviceId $DevicesToEncrypt += @($deviceId) if (-not (IsProtectorPresent -DeviceId $deviceId -ProtectorType NUMERICALPASSWORD_PROTECTOR)) { AddNumericalPasswordProtectorToVolume -DeviceId $deviceId } [uint32]$hResult = EscrowVolumeRecoveryInfo ` -RecoveryServiceEndpoint $RecoveryServiceEndpoint ` -DeviceId $deviceId ` -IgnoreError:$IgnoreEscrowRecoveryKeyFailure if (-not (IsAutoUnlockProtectorPresent -DeviceId $deviceId)) { AddAutoUnlockProtectorToDataVolume -DeviceId $DeviceId } if (IsEncryptionNeeded -DeviceId $DeviceId -DoNotResumeSuspendedEncryption:$DoNotResumeSuspendedEncryption) { StartEncrypting -EncryptionMethod $EncryptionMethod -DeviceId $deviceId EnableKeyProtectors -DeviceId $deviceId } } } Write-Debug("EncryptAndEscrowDataVolumes: Return " + $DevicesToEncrypt|Out-String) return $DevicesToEncrypt } Function GetEncryptableVolume() { <# .SYNOPSIS Lookup a volume from Win32_EncryptableVolume. .DESCRIPTION Lookups up the Win32_EncryptableVolume object for a given volume. Throws if the volume is not found. .PARAMETER DeviceId Device id to lookup. .RETURNVALUE Win32_EncryptableVolume Volume object for given device ID. #> Param([Parameter(Mandatory=$True)][string]$DeviceId) [string]$id = (EscapeWmiString $DeviceId) [psobject]$volume = Get-WmiObject -Query ("SELECT * FROM Win32_EncryptableVolume WHERE DeviceId = '$id'") -Namespace $BitLockerWmiNamespace if ($volume -eq $Null) { Throw "Win32_EncryptableVolume WMI lookup failed to find device $DeviceId." } return $volume } Function EscapeWmiString([string]$stringToEscape) { <# .SYNOPSIS Internal helper to escape back slash characters in WMI strings. .PARAMETER stringToEscape String with backslashes to escape with double backslashes. .RETURNVALUE String with escaped backslash characters. #> [string]$result = $stringToEscape.Replace("\", "\\") return $result } Function GetConversionStatus([psobject]$encryptableVolume) { <# .SYNOPSIS Internal helper for getting encryption status from a volume #> [psobject]$conversionStatus = $encryptableVolume.GetConversionStatus() return $conversionStatus } Function WaitForEncryptionCompletion() { <# .SYNOPSIS Blocks until a drive is finished encrypting. .DESCRIPTION Polls until the conversion status on the device drops to 1 (Encrypted). .PARAMETER DeviceId The device ID to monitor. #> Param([Parameter(Mandatory=$True)][string]$DeviceId) Write-Debug "WaitForEncryptionCompletion DeviceId=$DeviceId" [psobject]$volume = GetEncryptableVolume -DeviceId $deviceId [bool]$complete = $False while (-not $complete) { $complete = $True [psobject]$conversionStatusObj = (GetConversionStatus $volume) if ($conversionStatusObj.ReturnValue -ne 0) { Throw "Error getting encryption status on device $DeviceId." + (GetMbamWmiErrorMessage($conversionStatusObj.ReturnValue)) } [ConversionStatus]$status = $conversionStatusObj.ConversionStatus if ($status -eq [ConversionStatus]::ENCRYPTION_IN_PROGRESS) { [uint32]$percentage = $conversionStatusObj.EncryptionPercentage Write-Host("Encryption of device $DeviceId is $percentage % complete") $complete = $False } if (-not $complete) { Write-Debug "WaitForEncryptionCompletion: Sleeping for 60 seconds/" Sleep -Seconds 60 } } Write-Debug "WaitForEncryptionCompletion: Returned from function" } Function GetOsVersion { <# .SYNOPSIS Gets the OS version from WMI Win32_OperatingSystem. .DESCRIPTION Gets the OS version from WMI Win32_OperatingSystem as integer values. .RETURNVALUE An hash table with major and minor os version as uint32 values. #> Write-Debug "GetOsVersion" # Split the WMI version into segments [psobject]$wmiVersion = (Get-WmiObject -Query ("SELECT * FROM Win32_OperatingSystem")) if ($wmiVersion -eq $Null) { Throw "WMI query to Win32_OperatingSystem failed." } [string[]]$osVersion = $wmiVersion.Version.Split('.') # OS version should be in a n.n.n format if ($osVersion.count -lt 2) { Throw "OS Version must have at least 2 segments." } # Convert the segments into integers for caller to use [uint32]$major = ($osVersion[0]); [uint32]$minor = ($osVersion[1]); # Return an array of major and minor OS version [hashtable]$version = @{} $version.major = $major $version.minor = $minor Write-Debug "GetOsVersion: Return Major=$version.major Minor=$version.minor" return $version } Function IsWindows7OrAbove() { <# .SYNOPSIS Minimum OS version checker. .DESCRIPTION Checks the OS version for a minimum of Windows 7. .RETURNVALUE True if Windows 7 or above, False otherwise. #> Write-Debug "IsWindows7OrAbove" $retval = $False if ((((GetOsVersion).major -eq 6) -and ((GetOsVersion).minor -gt 0)) -or ((GetOsVersion).major -gt 6)) { $retval = $True } Write-Debug "IsWindows7OrAbove: Return $retval" return $retval } Function IsDomainJoined() { <# .SYNOPSIS Checks that the computer is domain joined. .DESCRIPTION Queries Win32_ComputerSystem to see if computer is domain joined. .RETURNVALUE True is domain joined, False if not. #> Write-Debug "IsDomainJoined" [bool]$retval = $false [psobject] $computerSystemObj = Get-WmiObject Win32_ComputerSystem if (-not $computerSystemObj) { Throw "IsDomainJoined: Failed to get WMI Win32_ComputerSystem." } $retval = ($computerSystemObj.PartOfDomain -eq $True) Write-Debug "IsDomainJoined: Return $retval" return $retval } Function ExecuteCommand() { <# .SYNOPSIS Executes a command. .DESCRIPTION Executes a command and captures output. .PARAMETER Command The command to execute. .PARAMETER ArgList A string containing the arguments to pass to the command. .RETURNVALUE A hash table with three named values: [uint32]ExitCode, [ArrayList]StdOut, [ArrayList]StdError) where: ExitCode is the process exit code. StdOut is an array of strings capturing stdout. StdErr is a string of all error output generated by the command. #> Param( [Parameter(Mandatory=$True)][string]$Command, [string]$ArgList ) Write-Debug "ExecuteCommand Command=$Command ArgList=$ArgList" # Save the ErrorActionPreference $originalErrorActionPreference = $ErrorActionPreference # Set the ErrorActionPreference to hide errors $ErrorActionPreference = "SilentlyContinue" # Initialize the output vars [System.Collections.ArrayList]$stdout = @() [System.Collections.ArrayList]$stderr = @() [string]$errout = "" # The argument list is optional if ($ArgList -eq $Null) { $ArgList = "" } # Execute the command try { $global:LASTEXITCODE = 0 $null = Invoke-Expression "$Command $ArgList 2>''" -ErrorVariable stderr -OutVariable stdout } catch { # stderr and return code are used instead of exceptions } # Set ErrorActionPreference to the original value $ErrorActionPreference = $originalErrorActionPreference # Get the exception part of the ErrorRecord if ($stderr -and ($stderr.Count -gt 0)) { $errout = $stderr[0].Exception.Message } [hashtable]$result = @{} $result.ExitCode = $LASTEXITCODE $result.StdOut = $stdout $result.StdErr = $errout # Clear the exit code to prevent MDT from reading it and signaling failure. $global:LASTEXITCODE = 0 Write-Debug "ExecuteCommand: Return ExitCode=$result.ExitCode" Write-Debug "ExecuteCommand: Return StdErr=" foreach ($line in $result.StdErr) { Write-Debug $line } Write-Debug "ExecuteCommand: Return StdOut=" foreach ($line in $result.StdOut) { Write-Debug $line } return $result } Function FindCommand() { <# .SYNOPSIS Find a system command. .DESCRIPTION Looks for a command in system32 and sysnative directories. If the command is not found, an exception is thrown. .PARAMETER Command The name of the command to locate. .RETURNVALUE The full system path of the command if found. If not found, the command is returned unchanged. #> Param([Parameter(Mandatory=$True)][string]$Command) Write-Debug "FindCommand Command=$Command" [string]$systemRoot = (Get-ChildItem -Path Env:SystemRoot).Value [string]$commandToReturn = "" if (Test-Path -Path ("$systemRoot\system32\$Command")) { $commandToReturn = "$systemRoot\system32\$Command" } elseif (Test-Path -Path("$systemRoot\sysnative\$Command")) { $commandToReturn = "$systemRoot\sysnative\$Command" } else { Throw "System command $Command was not found." } Write-Debug "FindCommand: Return $commandToReturn" return $commandToReturn } Function IsElevated { <# .SYNOPSIS Check if script is running with Administrator privileges. .DESCRIPTION Check if script is running with Administrator privileges. .RETURNVALUE True if script is running with Administrator privileges. #> Write-Debug "IsElevated" [System.Security.Principal.WindowsIdentity]$windowsIdentity = [System.Security.Principal.WindowsIdentity]::GetCurrent() [System.Security.Principal.WindowsPrincipal]$windowsPrincipal = new-object System.Security.Principal.WindowsPrincipal($windowsIdentity) [System.Security.Principal.WindowsBuiltInRole]$adminRole="Administrator" [bool]$elevated=$windowsPrincipal.IsInRole($adminRole) Write-Debug "IsElevated: Return $elevated" return $elevated } Function IsReadyForBitLocker() { <# .SYNOPSIS Wrapper to bdehdcfg -driveinfo. .DESCRIPTION Runs bdehdcfg -driveinfo to see if a machine is configured for BitLocker. If not ready for BitLocker, the full output of the bdehdcfg command is sent to stdout for debugging the reason. .RETURNVALUE True if computer is ready for BitLocker, False if not. #> Write-Debug "IsReadyForBitLocker" [string]$command = FindCommand -Command "bdehdcfg.exe" [string]$arguments = "-driveinfo" $result = ExecuteCommand -Command $command -ArgList $arguments [bool]$found = ($result.ExitCode -eq $BDEHDCFG_E_BDECFG_READY_FOR_BITLOCKER) if (-not $found) { Write-Host "Failed to verify that computer is ready for BitLocker. Bdehdcfg.exe output:" foreach ($line in $result.StdOut) { Write-Host $line } } Write-Debug "IsReadyForBitLocker: Return $found" return $found } Function IsValidMbamVersion() { <# .SYNOPSIS Check if a valid version of MBAM is installed that supports the script. .DESCRIPTION Check if a valid version of MBAM is installed that supports the script. This script has dependency on the new WMI methods introduced in MBAM 2.5 SP1. .RETURNVALUE True if a valid version of MBAM is installed, False if not. #> Write-Debug "IsValidMbamVersion" [bool]$retval = $false [string]$mbamRegKeyPath = "HKLM:\SOFTWARE\Microsoft\MBAM" # Check MBAM registry values: "Installed" should be 1 and "AgentVersion" should be at least "2.5.1000". if (Test-Path $mbamRegKeypath) { $mbamRegKey = (Get-Item $mbamRegKeyPath) [Int32]$installed = $mbamRegKey.GetValue("Installed") if ($installed -eq 1) { [Version]$mbamVersion = $mbamRegKey.GetValue("AgentVersion") if (($mbamVersion -ne $null)) { if (($mbamVersion.Major -gt 2) -or (($mbamVersion.Major -eq 2) -and ($mbamVersion.Minor -gt 5)) -or (($mbamVersion.Major -eq 2) -and ($mbamVersion.Minor -eq 5) -and ($mbamVersion.Build -ge 1000))) { $retval = $true } } } } Write-Debug "IsValidMbamVersion: Return $retval" return $retval } Function IsTpmPresent() { <# .SYNOPSIS Check if TPM is present. .DESCRIPTION Check if the computer has a 1.2 TPM or later. If TPM is turned off in the BIOS, this function will return False. .RETURNVALUE True if TPM is present, False if not. #> Write-Debug "IsTpmPresent" [bool]$retval = $false # Get the Win32_Tpm WMI instance and check the version. [psobject]$tpm = Get-WmiObject -Query ("SELECT * FROM Win32_Tpm") -Namespace $TpmWmiNamespace if ($tpm -ne $null) { [Version]$tpmVersion = (GetTpmVersionFromSpecVersion $tpm.SpecVersion) if (($tpmVersion.Major -gt 1) -or (($tpmVersion.Major -eq 1) -and ($tpmVersion.Minor -ge 2))) { $retval = $True } } Write-Debug "IsTpmPresent: Return $retval" return $retval } Function GetTpmVersionFromSpecVersion() { <# .SYNOPSIS Get TPM major and minor version from TPM specification version. .DESCRIPTION Get TPM major and minor version from TPM specification version. A TPM spec version includes the major and minor TCG specification version, the specification revision level, and the errata revision level, e.g. "1.2, 2, 0". We are only interested in the major and minor version. .PARAMETER TpmSpecVersion TPM specification version. .RETURNVALUE TPM major and minor version. #> Param([Parameter(Mandatory=$True)][string]$specVersion) Write-Debug "GetTpmVersionFromSpecVersion" [string]$version = "" try { # Extract the hexadecimal major and minor version and convert to decimal. ([string]$hexMajor, [string]$hexMinor) = $specVersion.split(",")[0].Trim().split(".") [string]$major = [Convert]::ToInt32($hexMajor, 16) [string]$minor = [Convert]::ToInt32($hexMinor, 16) $version = ($major + "." + $minor) } catch { Throw "Failed to get the TPM version from TPM specification version: $specVersion." } Write-Debug "GetTpmVersionFromSpecVersion: Return $version" return $version } Function IsMbamPolicyApplied() { <# .SYNOPSIS Determines if MBAM policy has been applied to the machine. .DESCRIPTION Determines if MBAM policy has been applied to the machine. This script may not succeed it MBAM policy is detected. .RETURNVALUE True if MBAM policy is detected, False otherwise. #> [psobject]$mbamVolume = Get-WmiObject -Query ("SELECT Compliant FROM Mbam_Volume WHERE BitLockerManagementVolumeType = '1'") -Namespace $MbamWmiNamespace if ($mbamVolume -eq $null) { Throw "Failed to execute WMI Mbam_Volume.EscrowRecoveryKey. Make sure MBAM client is 2.5 SP1 or greater." } return -not ($mbamVolume.Compliant -eq "2") } ############################################################################### # # Main script section # ############################################################################### Function Invoke-MbamClientDeployment() { <# .SYNOPSIS Configures a client machine for MBAM .DESCRIPTION Encrypts a computer and escrows the BitLocker recovery keys with MBAM .PARAMETER RecoveryServiceEndpoint MBAM recovery service endpoint URL. .PARAMETER StatusReportingServiceEndpoint MBAM status reporting service endpoint URL. .PARAMETER EncryptionMethod BitLocker encryption method. .PARAMETER EncryptAndEscrowDataVolumes Encrypt non-removable data volumes. .PARAMETER WaitForEncryptionToComplete If present, script will block until all drives are encrypted. .PARAMETER IgnoreEscrowOwnerAuthFailure If present, failure escrow the TPM owner with MBAM will not cause an exception. .PARAMETER IgnoreEscrowRecoveryKeyFailure If present, failure to escrow BitLocker recovery key will not cause an exception. .PARAMETER IgnoreReportStatusFailure If present, failure to report status will not cause an exception. .PARAMETER DoNotResumeSuspendedEncryption If present, suspended encryption will not be resumed. .RETURNVALUE Returns 0 on success #> Param( [Parameter(HelpMessage="URL of MBAM recovery service endpoint")][string]$RecoveryServiceEndpoint = $null, [Parameter(HelpMessage="URL of MBAM reporting service endpoint")][string]$StatusReportingServiceEndpoint = $null, [Parameter(HelpMessage="Default is AES128")][string]$EncryptionMethod = "AES128", [switch]$EncryptAndEscrowDataVolumes, [switch]$WaitForEncryptionToComplete, [switch]$IgnoreEscrowOwnerAuthFailure, [switch]$IgnoreEscrowRecoveryKeyFailure, [switch]$IgnoreReportStatusFailure, [switch]$DoNotResumeSuspendedEncryption ) if ([string]::IsNullOrEmpty($RecoveryServiceEndpoint)) { Throw "RecoveryServiceEndpoint is required." } # Redefine encryption method as enum [EncryptionMethod]$EncryptionMethod = $EncryptionMethod Write-Debug("RecoveryServiceEndpoint is $RecoveryServiceEndpoint") Write-Debug("StatusReportingServiceEndpoint is $StatusReportingServiceEndpoint") # # Prerequisite check # Write-Host "Checking prerequisites ..." if (-not (IsElevated)) { Throw "Script must run with elevated privileges." } if (-not (IsWindows7OrAbove)) { Throw "MBAM client deployment is only supported on Windows 7 or greater." } if (-not (IsValidMbamVersion)) { Throw "MBAM client deployment is only supported on MBAM 2.5 SP1 or greater." } if (-not (IsDomainJoined)) { Throw "System must be domain joined." } if (IsMbamPolicyApplied) { Throw "MBAM policy was detected. Verify that the OU used for pre-deployment does not apply MBAM policy." } if (-not (IsTpmPresent)) { Write-Host "Compatible TPM cannot be found on this computer. The volumes will not be encrypted. MBAM client deployment requires 1.2 TPM or later."; return # exit without throwing exception } if (-not (IsReadyForBitLocker)) { Throw "System is not ready for BitLocker. Verify that a BDE partition exists." } # # Prepare the TPM and escrow Owner-Auth # Write-Host "Preparing TPM and escrowing owner-auth to $RecoveryServiceEndpoint ..." [uint32]$hResult = (PrepareTpmAndEscrowOwnerAuth ` -RecoveryServiceEndpoint $RecoveryServiceEndpoint ` -IgnoreEscrowOwnerAuthFailure:$IgnoreEscrowOwnerAuthFailure) # # Add the TPM protector if no protector exists that uses TPM. # Write-Host "Adding TPM protector to OS volume ..." [string]$deviceId = GetOsDeviceId if (-not (IsTpmProtectorPresent -DeviceId $deviceId)) { AddTpmProtectorToOsVolume } # # Encrypt the OS volume and Escrow recovery key with MBAM # Write-Host "Escrowing OS volume recovery key to $RecoveryServiceEndpoint and starting encryption ..." [system.array]$VolumesToEncrypt = EncryptAndEscrowOsVolume ` -EncryptionMethod $EncryptionMethod ` -RecoveryServiceEndpoint $RecoveryServiceEndpoint ` -IgnoreEscrowRecoveryKeyFailure:$IgnoreEscrowRecoveryKeyFailure ` -DoNotResumeSuspendedEncryption:$DoNotResumeSuspendedEncryption # # Encrypt the data volume(s) and Escrow recovery keys with MBAM # if ($EncryptAndEscrowDataVolumes) { Write-Host "Escrowing data volume recovery key(s) to $RecoveryServiceEndpoint and starting encryption ..." $VolumesToEncrypt += EncryptAndEscrowDataVolumes ` -EncryptionMethod $EncryptionMethod ` -RecoveryServiceEndpoint $RecoveryServiceEndpoint ` -IgnoreEscrowRecoveryKeyFailure:$IgnoreEscrowRecoveryKeyFailure ` -DoNotResumeSuspendedEncryption:$DoNotResumeSuspendedEncryption } # # Wait for encryption to complete on all volumes # if ($WaitForEncryptionToComplete) { foreach ($deviceId in $VolumesToEncrypt) { if (($deviceId -ne $null) -and (![string]::IsNullOrEmpty($deviceId))) { WaitForEncryptionCompletion -DeviceId $deviceId } } } # # Report system status to MBAM # if (($StatusReportingServiceEndpoint -ne $null) -and (![string]::IsNullOrEmpty($StatusReportingServiceEndpoint))) { Write-Host "Reporting encryption status to $StatusReportingServiceEndpoint ..." [uint32]$hResult = (ReportStatus ` -ReportingServiceEndpoint $StatusReportingServiceEndpoint ` -IgnoreError:$IgnoreReportStatusFailure) } # # Set the registry to indicate a first run so the MBAM agent can # ask for a PIN/Password once on first login. # Set-ItemProperty -Path HKLM:\Software\Microsoft\Mbam -Name EnactOnFirstLoginRequired -Value 1 -Type DWord } ############################################################################### # # Script Main # ############################################################################### # If unit testing, don't call Invoke-MbamClientDeployment since parameters # will not be available if ((Test-Path variable:IsPesterInUse) -and $IsPesterInUse) { return } Invoke-MbamClientDeployment ` -RecoveryServiceEndpoint:$RecoveryServiceEndpoint ` -StatusReportingServiceEndpoint:$StatusReportingServiceEndpoint ` -EncryptionMethod:$EncryptionMethod ` -EncryptAndEscrowDataVolumes:$EncryptAndEscrowDataVolumes ` -WaitForEncryptionToComplete:$WaitForEncryptionToComplete ` -IgnoreEscrowOwnerAuthFailure:$IgnoreEscrowOwnerAuthFailure ` -IgnoreEscrowRecoveryKeyFailure:$IgnoreEscrowRecoveryKeyFailure ` -IgnoreReportStatusFailure:$IgnoreReportStatusFailure ` -DoNotResumeSuspendedEncryption:$DoNotResumeSuspendedEncryption # SIG # Begin signature block # MIInwQYJKoZIhvcNAQcCoIInsjCCJ64CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBEBSTU+E0hbTNO # n+u8ElEQCD0UyX8BMUU4Ey8tnkBYJaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICuTE57gPZrYF6nd8XffE0P3 # 2Qmm/5m5pl3AQmpASC8lMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAd5iX02UAoBgUgpyI6Pz4zdsrtVxtngXVng8Dcg3I4qL8OxMcGfmjm5nv # D4/rqey1YfrtELN3tr/xeMKeV1INz6skhkziQLO5fCuM8YKWJ/DB7cMeK0mabvbf # nyJs3eKde+7menbfG68cmspuyYkEWAh23WLlW9ypKaCLmcegfD+PRyxzhKXL10Gv # LBBJZJbQKyqU8h/LyoR1bNqUSBd77rOcVVd71XUyzlc3VOy9QZUTQCiHw3wXGTp5 # If4bEBKoADLGO8Th+yp+7ZusN8ZlfHvlVFUXos73UIVb0Ia9/nfhEzaKuCr+Osuj # bBjCEwuydx7PJ48ct25+smzaF+aiuKGCFyswghcnBgorBgEEAYI3AwMBMYIXFzCC # FxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD5eh4o2nRv9EjfcSI3Ym8aFmJn9/9nvCW9qLptfooF+gIGZYLUHucS # GBMyMDIzMTIyMDE4Mjc1Ni4xNDNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRejCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC # OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x # sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb # aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb # 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy # S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS # 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU # bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9 # TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp # TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa # GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu # h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+ # XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg # dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI # gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr # uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld # mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd # qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa # 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL # 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC # +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg # jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL # sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH # N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6 # bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtYwggI/AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy # QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOktUpwwIhgPMjAyMzEyMjAxOTQ2MzZaGA8yMDIzMTIyMTE5NDYzNlowdjA8Bgor # BgEEAYRZCgQBMS4wLDAKAgUA6S1SnAIBADAJAgEAAgEDAgH/MAcCAQACAhFRMAoC # BQDpLqQcAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA # AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAqO9jmkdP28kC7172 # SpGyGRDkqdv9YsQJ8MOrdc+jm3DPDRuAlvHckoNXAMJD39+e3t+8UgB2TUHalP31 # Q5CJg6/MO8AJ+dYFtc4qCoQxdoFiV+HzKDkTgZB+fKk32nfmgOwX1wtSOUYYYe3s # aHftgfP3O35e0M6jF9gbaJ8O7rkxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAd6eSJ6WnyhEPQABAAAB3jANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCCa8eb+nuPTw9EI3wht+gtrzlLzNs5tJzd3igsKp32ubzCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EII4+I58NwV4QEEkCf+YLcyCtPnD9TbPzUtgPjgdz # fh17MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHe # nkielp8oRD0AAQAAAd4wIgQgUtKv91/0SnOHlXLzKxGpL0RfHKEWJD9YY4K4yEtM # /mEwDQYJKoZIhvcNAQELBQAEggIAPKeZKnYGiD72XmvZ9nj1QeVpfq6dj6km2VL4 # ArSVwtXc+3ynnFfzRnc0OvJUa93PfAIgrk/0RK1MZKUSqWmyovdMNUsE+CJE1uxl # Kz0Rc3bcMtevH84QyCNPCR8soZk1lQBDkAX6B5nRro/NI0JKKulTXf/o8eAeZlyz # iigaXTCA3L9ICb49arVqvUZfGf/syCwZqyeAt8gLcOtCf73Fg/sZmbLepNsf/bIG # xA+HMI9EwyZ2XDQKWOqdptFYwm8zb7zNaf7WvTYuHdpCoGDrDDtfpIsFQlskRGct # c4UZfn7VBLGZyUFxAtKOCrx+e4rAtEs3P8JIJgtDEEL8J3pg8vZBmtL3OpKBUS/0 # sYIVYcS9m58U2jxpSV690W/Q0At4A2xi6cdAB0iO4O/bo6rmTgONkLdbW5xbGXw3 # ej/UJygfpFc2lJemu6Io6+fjN8oLl+xJzlLZoQeADi7rGAEntG/Uouv2hfpPSDS9 # pLmvrLmQtxll9FD2BSwvhVppOhBHbIalizktUpRXmINDAd0JsHXioZYIv7VKbtzw # wacOU7ArFgLc3npMZ3Q9j9fi0cm+jBq8uvk4wqtyNraRvhoQSdXMuhUwrUtaPZg0 # p3+LTUbrY0cTPaq8kSQvVDMoG9l64PcjX/QixMIeI0mkfZ5VU4ajBuJ9EYlqjzZk # PlyC1cY= # SIG # End signature block
combined_dataset/train/non-malicious/2629.ps1
2629.ps1
function Copy-SQLAgentJob{ param([string]$Source ,[string[]]$Targets ,[string]$JobName) [System.Reflection.Assembly]::LoadWithPartialName('Microsoft.SqlServer.SMO') | out-null $smosource = New-Object Microsoft.SqlServer.Management.Smo.Server $Source $JobScript = $smosource.JobServer.Jobs[$JobName].Script() foreach($Target in $Targets){ $smotarget = New-Object Microsoft.SqlServer.Management.Smo.Server $Target if($smotarget.JobServer.Jobs.Name -notcontains $JobName){ $smotarget.Databases['msdb'].ExecuteNonQuery($JobScript) } } } Copy-SQLAgentJob -Source 'SHION' -Targets 'SHION\ALBEDO' -JobName 'Backup Databases - Powershell'
combined_dataset/train/non-malicious/get-SQLInstanceInfo.ps1
get-SQLInstanceInfo.ps1
function get-SQLInstanceInfo { <# .SYNOPSIS get-SQLInstanceInfo .DESCRIPTION Retrieves the following information for each SQL Instance on the server or cluster node, and returns as an array of PSCustomObjects DisplayName Name Clustered InstanceID FileVersion Version VirtualName Instance Port ServiceState ServiceAccount Edition AuditLevel LoginMode PhysicalMemory Processors Product ProductLevel MajorVersion MinorVersion Build Release .NOTES Dependencies : None ChangeLog : Date Initials Short Description 10/04/2011 RLV New .LINK http://technet.microsoft.com/en-us/magazine/ff458353.aspx #> [CmdletBinding()] param ( [Parameter(Mandatory=$false)][string]$ServerName = $(hostname) ) trap { #show-InnerException -ex $_ $_ break } #write-log "$($MyInvocation.InvocationName) - Begin function" foreach($Key in $PSBoundParameters.Keys){ write-log "$($MyInvocation.InvocationName) PARAM: -$Key - $($PSBoundParameters[$Key])" } [system.reflection.assembly]::LoadWithPartialName('Microsoft.SQLServer.SQLWMIManagement') | out-null $InstanceInfos = @() $Instances = (new-object 'microsoft.sqlserver.management.smo.Wmi.ManagedComputer' "$ServerName").Services | where-object{$_.type -eq 'SqlServer'} foreach($Instance in $Instances ) { [psobject]$InstanceInfo = "" | Select-Object DisplayName, Name, Clustered, ` InstanceID, FileVersion, Version, ` VirtualName, Instance, Port, ServiceState, ` ServiceAccount, Edition, AuditLevel, LoginMode, ` PhysicalMemory, Processors, Product, ProductLevel, ` MajorVersion, MinorVersion, Build, Release write-verbose "Processing SQL Instance: $($Instance.Name)" $InstanceInfo.DisplayName = $Instance.DisplayName $InstanceInfo.Name = $Instance.Name $InstanceInfo.Clustered = $Instance.AdvancedProperties['CLUSTERED'].Value $InstanceInfo.InstanceID = $Instance.AdvancedProperties['INSTANCEID'].Value $InstanceInfo.FileVersion = $Instance.AdvancedProperties['FILEVERSION'].Value $InstanceInfo.Version = $Instance.AdvancedProperties['VERSION'].Value if($Instance.AdvancedProperties['VSNAME'].Value -eq ''){ $InstanceInfo.VirtualName = 'N/A' } else { $InstanceInfo.VirtualName = $Instance.AdvancedProperties['VSNAME'].Value } if($Instance.Name.Split('$')[1] -eq $Null){ [string]$InstanceName = 'MSSQLSERVER' } else { [string]$InstanceName = $Instance.Name.Split('$')[1] } $InstanceInfo.Instance = $InstanceName $InstanceInfo.Port = $Instance.Parent.ServerInstances[$InstanceName].ServerProtocols['Tcp'].IPAddresses['IPALL'].IPAddressProperties['TcpPort'].Value $InstanceInfo.ServiceAccount = $Instance.ServiceAccount $InstanceInfo.ServiceState = $Instance.ServiceState if($InstanceInfo.Clustered){ $SQLInstanceName = "$($InstanceInfo.VirtualName),$($InstanceInfo.Port)" } else { $SQLInstanceName = "$ServerName,$($InstanceInfo.Port)" } write-verbose "SQL InstanceName: $SQLInstanceName" [System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.Smo") |out-null $SQL = new-object "Microsoft.SQLServer.Management.SMO.Server" $SQLInstanceName $InstanceInfo.Edition = $SQL.Edition $InstanceInfo.AuditLevel = $SQL.AuditLevel $InstanceInfo.LoginMode = $SQL.LoginMode $InstanceInfo.PhysicalMemory = $SQL.PhysicalMemory $InstanceInfo.Processors = $SQL.Processors $InstanceInfo.Product = $SQL.Product $InstanceInfo.ProductLevel = $SQL.ProductLevel $InstanceInfo.MajorVersion = $SQL.Version.Major $InstanceInfo.MinorVersion = $SQL.Version.Minor $InstanceInfo.Build = $SQL.Version.Build if($SQL.Version.Major -eq 10) { switch($SQL.Version.Minor) { 0 { $InstanceInfo.Release = 'Gold' } 50 { $InstanceInfo.Release = 'R2' } else { throw "Could not convert minor version into release. Version number $($SQL.Versioin.Minor)" } } } else { $InstanceInfo.Release = 'Gold' } $InstanceInfos += $InstanceInfo } write-verbose "Showing results" $InstanceInfos }
combined_dataset/train/non-malicious/sample_44_32.ps1
sample_44_32.ps1
# Copyright 2019 The Kubernetes Authors. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. <# .SYNOPSIS Library for configuring Windows nodes and joining them to the cluster. .NOTES This module depends on common.psm1. Some portions copied / adapted from https://github.com/Microsoft/SDN/blob/master/Kubernetes/windows/start-kubelet.ps1. .EXAMPLE Suggested usage for dev/test: [Net.ServicePointManager]::SecurityProtocol = ` [Net.SecurityProtocolType]::Tls12 Invoke-WebRequest ` https://github.com/kubernetes/kubernetes/raw/master/cluster/gce/windows/k8s-node-setup.psm1 ` -OutFile C:\k8s-node-setup.psm1 Invoke-WebRequest ` https://github.com/kubernetes/kubernetes/raw/master/cluster/gce/windows/configure.ps1 ` -OutFile C:\configure.ps1 Import-Module -Force C:\k8s-node-setup.psm1 # -Force to override existing # Execute functions manually or run configure.ps1. #> # IMPORTANT PLEASE NOTE: # Any time the file structure in the `windows` directory changes, `windows/BUILD` # and `k8s.io/release/lib/releaselib.sh` must be manually updated with the changes. # We HIGHLY recommend not changing the file structure, because consumers of # Kubernetes releases depend on the release structure remaining stable. # TODO: update scripts for these style guidelines: # - Remove {} around variable references unless actually needed for clarity. # - Always use single-quoted strings unless actually interpolating variables # or using escape characters. # - Use "approved verbs": # https://docs.microsoft.com/en-us/powershell/developer/cmdlet/approved-verbs-for-windows-powershell-commands # - Document functions using proper syntax: # https://technet.microsoft.com/en-us/library/hh847834(v=wps.620).aspx $GCE_METADATA_SERVER = "169.254.169.254" # The "management" interface is used by the kubelet and by Windows pods to talk # to the rest of the Kubernetes cluster *without NAT*. This interface does not # exist until an initial HNS network has been created on the Windows node - see # Add_InitialHnsNetwork(). $MGMT_ADAPTER_NAME = "vEthernet (Ethernet*" $CRICTL_VERSION = 'v1.29.0' $CRICTL_SHA256 = '9b679305cb05f73e9e4868056e7d48805c47e24d2d38849e64395ff54cf5c701' Import-Module -Force C:\common.psm1 # Writes a TODO with $Message to the console. function Log_Todo { param ( [parameter(Mandatory=$true)] [string]$Message ) Log-Output "TODO: ${Message}" } # Writes a not-implemented warning with $Message to the console and exits the # script. function Log_NotImplemented { param ( [parameter(Mandatory=$true)] [string]$Message ) Log-Output "Not implemented yet: ${Message}" -Fatal } # Fails and exits if the route to the GCE metadata server is not present, # otherwise does nothing and emits nothing. function Verify_GceMetadataServerRouteIsPresent { Try { Get-NetRoute ` -ErrorAction "Stop" ` -AddressFamily IPv4 ` -DestinationPrefix ${GCE_METADATA_SERVER}/32 | Out-Null } Catch [Microsoft.PowerShell.Cmdletization.Cim.CimJobException] { Log-Output -Fatal ` ("GCE metadata server route is not present as expected.`n" + "$(Get-NetRoute -AddressFamily IPv4 | Out-String)") } } # Checks if the route to the GCE metadata server is present. Returns when the # route is NOT present or after a timeout has expired. function WaitFor_GceMetadataServerRouteToBeRemoved { $elapsed = 0 $timeout = 60 Log-Output ("Waiting up to ${timeout} seconds for GCE metadata server " + "route to be removed") while (${elapsed} -lt ${timeout}) { Try { Get-NetRoute ` -ErrorAction "Stop" ` -AddressFamily IPv4 ` -DestinationPrefix ${GCE_METADATA_SERVER}/32 | Out-Null } Catch [Microsoft.PowerShell.Cmdletization.Cim.CimJobException] { break } $sleeptime = 2 Start-Sleep ${sleeptime} ${elapsed} += ${sleeptime} } } # Adds a route to the GCE metadata server to every network interface. function Add_GceMetadataServerRoute { # Before setting up HNS the Windows VM has a "vEthernet (nat)" interface and # a "Ethernet" interface, and the route to the metadata server exists on the # Ethernet interface. After adding the HNS network a "vEthernet (Ethernet)" # interface is added, and it seems to subsume the routes of the "Ethernet" # interface (trying to add routes on the Ethernet interface at this point just # results in "New-NetRoute : Element not found" errors). I don't know what's # up with that, but since it's hard to know what's the right thing to do here # we just try to add the route on all of the network adapters. Get-NetAdapter | ForEach-Object { $adapter_index = $_.InterfaceIndex New-NetRoute ` -ErrorAction Ignore ` -DestinationPrefix "${GCE_METADATA_SERVER}/32" ` -InterfaceIndex ${adapter_index} | Out-Null } } # Returns a PowerShell object representing the Windows version. function Get_WindowsVersion { # Unlike checking `[System.Environment]::OSVersion.Version`, this long-winded # approach gets the OS revision/patch number correctly # (https://superuser.com/a/1160428/652018). $win_ver = New-Object -TypeName PSObject $win_ver | Add-Member -MemberType NoteProperty -Name Major -Value $(Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion' CurrentMajorVersionNumber).CurrentMajorVersionNumber $win_ver | Add-Member -MemberType NoteProperty -Name Minor -Value $(Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion' CurrentMinorVersionNumber).CurrentMinorVersionNumber $win_ver | Add-Member -MemberType NoteProperty -Name Build -Value $(Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion' CurrentBuild).CurrentBuild $win_ver | Add-Member -MemberType NoteProperty -Name Revision -Value $(Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion' UBR).UBR return $win_ver } # Writes debugging information, such as Windows version and patch info, to the # console. function Dump-DebugInfoToConsole { Try { $version = Get_WindowsVersion | Out-String $hotfixes = "$(Get-Hotfix | Out-String)" $image = "$(Get-InstanceMetadata 'image' | Out-String)" Log-Output "Windows version:`n$version" Log-Output "Installed hotfixes:`n$hotfixes" Log-Output "GCE Windows image:`n$image" } Catch { } } # Configures Window Defender preferences function Configure-WindowsDefender { if ((Get-WindowsFeature -Name 'Windows-Defender').Installed) { Log-Output "Configuring Windows Defender preferences" Set-MpPreference -SubmitSamplesConsent NeverSend Log-Output "Disabling Windows Defender sample submission" Set-MpPreference -MAPSReporting Disabled Log-Output "Disabling Windows Defender Microsoft Active Protection Service Reporting" Log-Output "Defender Preferences" Get-MpPreference } } # Converts the kube-env string in Yaml # # Returns: a PowerShell Hashtable object containing the key-value pairs from # kube-env. function ConvertFrom_Yaml_KubeEnv { param ( [parameter(Mandatory=$true)] [string]$kube_env_str ) $kube_env_table = @{} $currentLine = $null switch -regex (${kube_env_str} -split '\r?\n') { '^(\S.*)' { # record start pattern, line that doesn't start with a whitespace if ($null -ne $currentLine) { $key, $val = $currentLine -split ":",2 $kube_env_table[$key] = $val.Trim("'", " ", "`"") } $currentLine = $matches.1 continue } '^(\s+.*)' { # line that start with whitespace $currentLine += $matches.1 continue } } # Handle the last line if any if ($currentLine) { $key, $val = $currentLine -split ":",2 $kube_env_table[$key] = $val.Trim("'", " ", "`"") } return ${kube_env_table} } # Fetches the kube-env from the instance metadata. # # Returns: a PowerShell Hashtable object containing the key-value pairs from # kube-env. function Fetch-KubeEnv { # Testing / debugging: # First: # ${kube_env} = Get-InstanceMetadataAttribute 'kube-env' # or: # ${kube_env} = [IO.File]::ReadAllText(".\kubeEnv.txt") # ${kube_env_table} = ConvertFrom_Yaml_KubeEnv ${kube_env} # ${kube_env_table} # ${kube_env_table}.GetType() # The type of kube_env is a powershell String. $kube_env = Get-InstanceMetadataAttribute 'kube-env' $kube_env_table = ConvertFrom_Yaml_KubeEnv ${kube_env} Log-Output "Logging kube-env key-value pairs except CERT and KEY values" foreach ($entry in $kube_env_table.GetEnumerator()) { if ((-not ($entry.Name.contains("CERT"))) -and (-not ($entry.Name.contains("KEY")))) { Log-Output "$($entry.Name): $($entry.Value)" } } return ${kube_env_table} } # Sets the environment variable $Key to $Value at the Machine scope (will # be present in the environment for all new shells after a reboot). function Set_MachineEnvironmentVar { param ( [parameter(Mandatory=$true)] [string]$Key, [parameter(Mandatory=$true)] [AllowEmptyString()] [string]$Value ) [Environment]::SetEnvironmentVariable($Key, $Value, "Machine") } # Sets the environment variable $Key to $Value in the current shell. function Set_CurrentShellEnvironmentVar { param ( [parameter(Mandatory=$true)] [string]$Key, [parameter(Mandatory=$true)] [AllowEmptyString()] [string]$Value ) $expression = '$env:' + $Key + ' = "' + $Value + '"' Invoke-Expression ${expression} } # Sets environment variables used by Kubernetes binaries and by other functions # in this module. Depends on numerous ${kube_env} keys. function Set-EnvironmentVars { if ($kube_env.ContainsKey('WINDOWS_CONTAINER_RUNTIME_ENDPOINT')) { $container_runtime_endpoint = ${kube_env}['WINDOWS_CONTAINER_RUNTIME_ENDPOINT'] } else { Log-Output "ERROR: WINDOWS_CONTAINER_RUNTIME_ENDPOINT not set in kube-env, falling back in CONTAINER_RUNTIME_ENDPOINT" $container_runtime_endpoint = ${kube_env}['CONTAINER_RUNTIME_ENDPOINT'] } # Turning the kube-env values into environment variables is not required but # it makes debugging this script easier, and it also makes the syntax a lot # easier (${env:K8S_DIR} can be expanded within a string but # ${kube_env}['K8S_DIR'] cannot be afaik). $env_vars = @{ "K8S_DIR" = ${kube_env}['K8S_DIR'] # Typically 'C:\etc\kubernetes\node\bin' (not just 'C:\etc\kubernetes\node') "NODE_DIR" = ${kube_env}['NODE_DIR'] "CNI_DIR" = ${kube_env}['CNI_DIR'] "CNI_CONFIG_DIR" = ${kube_env}['CNI_CONFIG_DIR'] "WINDOWS_CNI_STORAGE_PATH" = ${kube_env}['WINDOWS_CNI_STORAGE_PATH'] "WINDOWS_CNI_VERSION" = ${kube_env}['WINDOWS_CNI_VERSION'] "CSI_PROXY_STORAGE_PATH" = ${kube_env}['CSI_PROXY_STORAGE_PATH'] "CSI_PROXY_VERSION" = ${kube_env}['CSI_PROXY_VERSION'] "CSI_PROXY_FLAGS" = ${kube_env}['CSI_PROXY_FLAGS'] "ENABLE_CSI_PROXY" = ${kube_env}['ENABLE_CSI_PROXY'] "PKI_DIR" = ${kube_env}['PKI_DIR'] "CA_FILE_PATH" = ${kube_env}['CA_FILE_PATH'] "KUBELET_CONFIG" = ${kube_env}['KUBELET_CONFIG_FILE'] "BOOTSTRAP_KUBECONFIG" = ${kube_env}['BOOTSTRAP_KUBECONFIG_FILE'] "KUBECONFIG" = ${kube_env}['KUBECONFIG_FILE'] "KUBEPROXY_KUBECONFIG" = ${kube_env}['KUBEPROXY_KUBECONFIG_FILE'] "LOGS_DIR" = ${kube_env}['LOGS_DIR'] "MANIFESTS_DIR" = ${kube_env}['MANIFESTS_DIR'] "INFRA_CONTAINER" = ${kube_env}['WINDOWS_INFRA_CONTAINER'] "WINDOWS_ENABLE_PIGZ" = ${kube_env}['WINDOWS_ENABLE_PIGZ'] "WINDOWS_ENABLE_HYPERV" = ${kube_env}['WINDOWS_ENABLE_HYPERV'] "ENABLE_NODE_PROBLEM_DETECTOR" = ${kube_env}['ENABLE_NODE_PROBLEM_DETECTOR'] "NODEPROBLEMDETECTOR_KUBECONFIG_FILE" = ${kube_env}['WINDOWS_NODEPROBLEMDETECTOR_KUBECONFIG_FILE'] "ENABLE_AUTH_PROVIDER_GCP" = ${kube_env}['ENABLE_AUTH_PROVIDER_GCP'] "AUTH_PROVIDER_GCP_STORAGE_PATH" = ${kube_env}['AUTH_PROVIDER_GCP_STORAGE_PATH'] "AUTH_PROVIDER_GCP_VERSION" = ${kube_env}['AUTH_PROVIDER_GCP_VERSION'] "AUTH_PROVIDER_GCP_HASH_WINDOWS_AMD64" = ${kube_env}['AUTH_PROVIDER_GCP_HASH_WINDOWS_AMD64'] "AUTH_PROVIDER_GCP_WINDOWS_BIN_DIR" = ${kube_env}['AUTH_PROVIDER_GCP_WINDOWS_BIN_DIR'] "AUTH_PROVIDER_GCP_WINDOWS_CONF_FILE" = ${kube_env}['AUTH_PROVIDER_GCP_WINDOWS_CONF_FILE'] "Path" = ${env:Path} + ";" + ${kube_env}['NODE_DIR'] "KUBE_NETWORK" = "l2bridge".ToLower() "KUBELET_CERT_PATH" = ${kube_env}['PKI_DIR'] + '\kubelet.crt' "KUBELET_KEY_PATH" = ${kube_env}['PKI_DIR'] + '\kubelet.key' "CONTAINER_RUNTIME_ENDPOINT" = $container_runtime_endpoint 'LICENSE_DIR' = 'C:\Program Files\Google\Compute Engine\THIRD_PARTY_NOTICES' } # Set the environment variables in two ways: permanently on the machine (only # takes effect after a reboot), and in the current shell. $env_vars.GetEnumerator() | ForEach-Object{ $message = "Setting environment variable: " + $_.key + " = " + $_.value Log-Output ${message} Set_MachineEnvironmentVar $_.key $_.value Set_CurrentShellEnvironmentVar $_.key $_.value } } # Configures various settings and prerequisites needed for the rest of the # functions in this module and the Kubernetes binaries to operate properly. function Set-PrerequisiteOptions { # Windows updates cause the node to reboot at arbitrary times. Log-Output "Disabling Windows Update service" & sc.exe config wuauserv start=disabled & sc.exe stop wuauserv Write-VerboseServiceInfoToConsole -Service 'wuauserv' -Delay 1 # Use TLS 1.2: needed for Invoke-WebRequest downloads from github.com. [Net.ServicePointManager]::SecurityProtocol = ` [Net.SecurityProtocolType]::Tls12 Configure-WindowsDefender } # Creates directories where other functions in this module will read and write # data. # Note: C:\tmp is required for running certain kubernetes tests. # C:\var\log is used by kubelet to stored container logs and also # hard-coded in the fluentd/stackdriver config for log collection. function Create-Directories { Log-Output "Creating ${env:K8S_DIR} and its subdirectories." ForEach ($dir in ("${env:K8S_DIR}", "${env:NODE_DIR}", "${env:LOGS_DIR}", "${env:CNI_DIR}", "${env:CNI_CONFIG_DIR}", "${env:MANIFESTS_DIR}", "${env:PKI_DIR}", "${env:LICENSE_DIR}"), "C:\tmp", "C:\var\log") { mkdir -Force $dir } } # Downloads some external helper scripts needed by other functions in this # module. function Download-HelperScripts { if (ShouldWrite-File ${env:K8S_DIR}\hns.psm1) { MustDownload-File ` -OutFile ${env:K8S_DIR}\hns.psm1 ` -URLs 'https://storage.googleapis.com/gke-release/winnode/config/sdn/master/hns.psm1' } } # Downloads the Kubernetes binaries from kube-env's NODE_BINARY_TAR_URL and # puts them in a subdirectory of $env:K8S_DIR. # # Required ${kube_env} keys: # NODE_BINARY_TAR_URL function DownloadAndInstall-KubernetesBinaries { # Assume that presence of kubelet.exe indicates that the kubernetes binaries # were already previously downloaded to this node. if (-not (ShouldWrite-File ${env:NODE_DIR}\kubelet.exe)) { return } $tmp_dir = 'C:\k8s_tmp' New-Item -Force -ItemType 'directory' $tmp_dir | Out-Null $urls = ${kube_env}['NODE_BINARY_TAR_URL'].Split(",") $filename = Split-Path -leaf $urls[0] $hash = $null if ($kube_env.ContainsKey('NODE_BINARY_TAR_HASH')) { $hash = ${kube_env}['NODE_BINARY_TAR_HASH'] } MustDownload-File -Hash $hash -OutFile $tmp_dir\$filename -URLs $urls tar xzvf $tmp_dir\$filename -C $tmp_dir Move-Item -Force $tmp_dir\kubernetes\node\bin\* ${env:NODE_DIR}\ Move-Item -Force ` $tmp_dir\kubernetes\LICENSES ${env:LICENSE_DIR}\LICENSES_kubernetes # Clean up the temporary directory Remove-Item -Force -Recurse $tmp_dir } # Downloads the csi-proxy binaries from kube-env's CSI_PROXY_STORAGE_PATH and # CSI_PROXY_VERSION, and then puts them in a subdirectory of $env:NODE_DIR. # Note: for now the installation is skipped for non-test clusters. Will be # installed for all cluster after tests pass. # Required ${kube_env} keys: # CSI_PROXY_STORAGE_PATH and CSI_PROXY_VERSION function DownloadAndInstall-CSIProxyBinaries { if ("${env:ENABLE_CSI_PROXY}" -eq "true") { if (ShouldWrite-File ${env:NODE_DIR}\csi-proxy.exe) { $tmp_dir = 'C:\k8s_tmp' New-Item -Force -ItemType 'directory' $tmp_dir | Out-Null $filename = 'csi-proxy.exe' $urls = "${env:CSI_PROXY_STORAGE_PATH}/${env:CSI_PROXY_VERSION}/$filename" MustDownload-File -OutFile $tmp_dir\$filename -URLs $urls Move-Item -Force $tmp_dir\$filename ${env:NODE_DIR}\$filename # Clean up the temporary directory Remove-Item -Force -Recurse $tmp_dir } } } function Start-CSIProxy { if ("${env:ENABLE_CSI_PROXY}" -eq "true") { Log-Output "Creating CSI Proxy Service" $flags = "-windows-service -log_file=${env:LOGS_DIR}\csi-proxy.log -logtostderr=false ${env:CSI_PROXY_FLAGS}" & sc.exe create csiproxy binPath= "${env:NODE_DIR}\csi-proxy.exe $flags" & sc.exe failure csiproxy reset= 0 actions= restart/10000 Log-Output "Starting CSI Proxy Service" & sc.exe start csiproxy Write-VerboseServiceInfoToConsole -Service 'csiproxy' -Delay 1 } } # TODO(pjh): this is copied from # https://github.com/Microsoft/SDN/blob/master/Kubernetes/windows/start-kubelet.ps1#L98. # See if there's a way to fetch or construct the "management subnet" so that # this is not needed. function ConvertTo_DecimalIP { param( [parameter(Mandatory = $true, Position = 0)] [Net.IPAddress] $IPAddress ) $i = 3; $decimal_ip = 0; $IPAddress.GetAddressBytes() | % { $decimal_ip += $_ * [Math]::Pow(256, $i); $i-- } return [UInt32]$decimal_ip } # TODO(pjh): this is copied from # https://github.com/Microsoft/SDN/blob/master/Kubernetes/windows/start-kubelet.ps1#L98. # See if there's a way to fetch or construct the "management subnet" so that # this is not needed. function ConvertTo_DottedDecimalIP { param( [parameter(Mandatory = $true, Position = 0)] [Uint32] $IPAddress ) $dotted_ip = $(for ($i = 3; $i -gt -1; $i--) { $remainder = $IPAddress % [Math]::Pow(256, $i) ($IPAddress - $remainder) / [Math]::Pow(256, $i) $IPAddress = $remainder }) return [String]::Join(".", $dotted_ip) } # TODO(pjh): this is copied from # https://github.com/Microsoft/SDN/blob/master/Kubernetes/windows/start-kubelet.ps1#L98. # See if there's a way to fetch or construct the "management subnet" so that # this is not needed. function ConvertTo_MaskLength { param( [parameter(Mandatory = $True, Position = 0)] [Net.IPAddress] $SubnetMask ) $bits = "$($SubnetMask.GetAddressBytes() | % { [Convert]::ToString($_, 2) } )" -replace "[\s0]" return $bits.Length } # Returns a network adapter object for the "management" interface via which the # Windows pods+kubelet will communicate with the rest of the Kubernetes cluster. # # This function will fail if Add_InitialHnsNetwork() has not been called first. function Get_MgmtNetAdapter { $net_adapter = Get-NetAdapter | Where-Object Name -like ${MGMT_ADAPTER_NAME} if (-not ${net_adapter}) { Throw ("Failed to find a suitable network adapter, check your network " + "settings.") } return $net_adapter } # Decodes the base64 $Data string and writes it as binary to $File. Does # nothing if $File already exists and $REDO_STEPS is not set. function Write_PkiData { param ( [parameter(Mandatory=$true)] [string] $Data, [parameter(Mandatory=$true)] [string] $File ) if (-not (ShouldWrite-File $File)) { return } # This command writes out a PEM certificate file, analogous to "base64 # --decode" on Linux. See https://stackoverflow.com/a/51914136/1230197. [IO.File]::WriteAllBytes($File, [Convert]::FromBase64String($Data)) Log_Todo ("need to set permissions correctly on ${File}; not sure what the " + "Windows equivalent of 'umask 077' is") # Linux: owned by root, rw by user only. # -rw------- 1 root root 1.2K Oct 12 00:56 ca-certificates.crt # -rw------- 1 root root 1.3K Oct 12 00:56 kubelet.crt # -rw------- 1 root root 1.7K Oct 12 00:56 kubelet.key # Windows: # https://docs.microsoft.com/en-us/dotnet/api/system.io.fileattributes # https://docs.microsoft.com/en-us/dotnet/api/system.io.fileattributes } # Creates the node PKI files in $env:PKI_DIR. # # Required ${kube_env} keys: # CA_CERT # ${kube_env} keys that can be omitted for nodes that do not use an # authentication plugin: # KUBELET_CERT # KUBELET_KEY function Create-NodePki { Log-Output 'Creating node pki files' if ($kube_env.ContainsKey('CA_CERT')) { $CA_CERT_BUNDLE = ${kube_env}['CA_CERT'] Write_PkiData "${CA_CERT_BUNDLE}" ${env:CA_FILE_PATH} } else { Log-Output -Fatal 'CA_CERT not present in kube-env' } if ($kube_env.ContainsKey('KUBELET_CERT')) { $KUBELET_CERT = ${kube_env}['KUBELET_CERT'] Write_PkiData "${KUBELET_CERT}" ${env:KUBELET_CERT_PATH} } else { Log-Output -Fatal 'KUBELET_CERT not present in kube-env' } if ($kube_env.ContainsKey('KUBELET_KEY')) { $KUBELET_KEY = ${kube_env}['KUBELET_KEY'] Write_PkiData "${KUBELET_KEY}" ${env:KUBELET_KEY_PATH} } else { Log-Output -Fatal 'KUBELET_KEY not present in kube-env' } Get-ChildItem ${env:PKI_DIR} } # Creates the bootstrap kubelet kubeconfig at $env:BOOTSTRAP_KUBECONFIG. # https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/ # # Create-NodePki() must be called first. # # Required ${kube_env} keys: # KUBERNETES_MASTER_NAME: the apiserver IP address. function Write_BootstrapKubeconfig { if (-not (ShouldWrite-File ${env:BOOTSTRAP_KUBECONFIG})) { return } # TODO(mtaufen): is user "kubelet" correct? Other examples use e.g. # "system:node:$(hostname)". $apiserverAddress = ${kube_env}['KUBERNETES_MASTER_NAME'] New-Item -Force -ItemType file ${env:BOOTSTRAP_KUBECONFIG} | Out-Null Set-Content ${env:BOOTSTRAP_KUBECONFIG} ` 'apiVersion: v1 kind: Config users: - name: kubelet user: client-certificate: KUBELET_CERT_PATH client-key: KUBELET_KEY_PATH clusters: - name: local cluster: server: https://APISERVER_ADDRESS certificate-authority: CA_FILE_PATH contexts: - context: cluster: local user: kubelet name: service-account-context current-context: service-account-context'.` replace('KUBELET_CERT_PATH', ${env:KUBELET_CERT_PATH}).` replace('KUBELET_KEY_PATH', ${env:KUBELET_KEY_PATH}).` replace('APISERVER_ADDRESS', ${apiserverAddress}).` replace('CA_FILE_PATH', ${env:CA_FILE_PATH}) Log-Output ("kubelet bootstrap kubeconfig:`n" + "$(Get-Content -Raw ${env:BOOTSTRAP_KUBECONFIG})") } # Fetches the kubelet kubeconfig from the metadata server and writes it to # $env:KUBECONFIG. # # Create-NodePki() must be called first. function Write_KubeconfigFromMetadata { if (-not (ShouldWrite-File ${env:KUBECONFIG})) { return } $kubeconfig = Get-InstanceMetadataAttribute 'kubeconfig' if ($kubeconfig -eq $null) { Log-Output ` "kubeconfig metadata key not found, can't write ${env:KUBECONFIG}" ` -Fatal } Set-Content ${env:KUBECONFIG} $kubeconfig Log-Output ("kubelet kubeconfig from metadata (non-bootstrap):`n" + "$(Get-Content -Raw ${env:KUBECONFIG})") } # Creates the kubelet kubeconfig at $env:KUBECONFIG for nodes that use an # authentication plugin, or at $env:BOOTSTRAP_KUBECONFIG for nodes that do not. # # Create-NodePki() must be called first. # # Required ${kube_env} keys: # KUBERNETES_MASTER_NAME: the apiserver IP address. function Create-KubeletKubeconfig { Write_BootstrapKubeconfig } # Creates the kubeconfig user file for applications that communicate with Kubernetes. # # Create-NodePki() must be called first. # # Required ${kube_env} keys: # CA_CERT # KUBERNETES_MASTER_NAME function Create-Kubeconfig { param ( [parameter(Mandatory=$true)] [string]$Name, [parameter(Mandatory=$true)] [string]$Path, [parameter(Mandatory=$true)] [string]$Token ) if (-not (ShouldWrite-File $Path)) { return } New-Item -Force -ItemType file $Path | Out-Null # In configure-helper.sh kubelet kubeconfig uses certificate-authority while # kubeproxy kubeconfig uses certificate-authority-data, ugh. Does it matter? # Use just one or the other for consistency? Set-Content $Path ` 'apiVersion: v1 kind: Config users: - name: APP_NAME user: token: APP_TOKEN clusters: - name: local cluster: server: https://APISERVER_ADDRESS certificate-authority-data: CA_CERT contexts: - context: cluster: local user: APP_NAME name: service-account-context current-context: service-account-context'.` replace('APP_NAME', $Name).` replace('APP_TOKEN', $Token).` replace('CA_CERT', ${kube_env}['CA_CERT']).` replace('APISERVER_ADDRESS', ${kube_env}['KUBERNETES_MASTER_NAME']) Log-Output ("${Name} kubeconfig:`n" + "$(Get-Content -Raw ${Path})") } # Creates the kube-proxy user kubeconfig file at $env:KUBEPROXY_KUBECONFIG. # # Create-NodePki() must be called first. # # Required ${kube_env} keys: # CA_CERT # KUBE_PROXY_TOKEN function Create-KubeproxyKubeconfig { Create-Kubeconfig -Name 'kube-proxy' ` -Path ${env:KUBEPROXY_KUBECONFIG} ` -Token ${kube_env}['KUBE_PROXY_TOKEN'] } # Returns the IP alias range configured for this GCE instance. function Get_IpAliasRange { $url = ("http://${GCE_METADATA_SERVER}/computeMetadata/v1/instance/" + "network-interfaces/0/ip-aliases/0") $client = New-Object Net.WebClient $client.Headers.Add('Metadata-Flavor', 'Google') return ($client.DownloadString($url)).Trim() } # Retrieves the pod CIDR and sets it in $env:POD_CIDR. function Set-PodCidr { while($true) { $pod_cidr = Get_IpAliasRange if (-not $?) { Log-Output ${pod_cIDR} Log-Output "Retrying Get_IpAliasRange..." Start-Sleep -sec 1 continue } break } Log-Output "fetched pod CIDR (same as IP alias range): ${pod_cidr}" Set_MachineEnvironmentVar "POD_CIDR" ${pod_cidr} Set_CurrentShellEnvironmentVar "POD_CIDR" ${pod_cidr} } # Adds an initial HNS network on the Windows node which forces the creation of # a virtual switch and the "management" interface that will be used to # communicate with the rest of the Kubernetes cluster without NAT. # # Note that adding the initial HNS network may cause connectivity to the GCE # metadata server to be lost due to a Windows bug. # Configure-HostNetworkingService() restores connectivity, look there for # details. # # Download-HelperScripts() must have been called first. function Add_InitialHnsNetwork { $INITIAL_HNS_NETWORK = 'External' # This comes from # https://github.com/Microsoft/SDN/blob/master/Kubernetes/flannel/l2bridge/start.ps1#L74 # (or # https://github.com/Microsoft/SDN/blob/master/Kubernetes/windows/start-kubelet.ps1#L206). # # daschott noted on Slack: "L2bridge networks require an external vSwitch. # The first network ("External") with hardcoded values in the script is just # a placeholder to create an external vSwitch. This is purely for convenience # to be able to remove/modify the actual HNS network ("cbr0") or rejoin the # nodes without a network blip. Creating a vSwitch takes time, causes network # blips, and it makes it more likely to hit the issue where flanneld is # stuck, so we want to do this as rarely as possible." $hns_network = Get-HnsNetwork | Where-Object Name -eq $INITIAL_HNS_NETWORK if ($hns_network) { if ($REDO_STEPS) { Log-Output ("Warning: initial '$INITIAL_HNS_NETWORK' HNS network " + "already exists, removing it and recreating it") $hns_network | Remove-HnsNetwork $hns_network = $null } else { Log-Output ("Skip: initial '$INITIAL_HNS_NETWORK' HNS network " + "already exists, not recreating it") return } } Log-Output ("Creating initial HNS network to force creation of " + "${MGMT_ADAPTER_NAME} interface") # Note: RDP connection will hiccup when running this command. New-HNSNetwork ` -Type "L2Bridge" ` -AddressPrefix "192.168.255.0/30" ` -Gateway "192.168.255.1" ` -Name $INITIAL_HNS_NETWORK ` -Verbose } # Get the network in uint32 for the given cidr function Get_NetworkDecimal_From_CIDR([string] $cidr) { $network, [int]$subnetlen = $cidr.Split('/') $decimal_network = ConvertTo_DecimalIP($network) return $decimal_network } # Get gateway ip string (the first address) based on pod cidr. # For Windows nodes the pod gateway IP address is the first address in the pod # CIDR for the host. function Get_Gateway_From_CIDR([string] $cidr) { $network=Get_NetworkDecimal_From_CIDR($cidr) $gateway=ConvertTo_DottedDecimalIP($network+1) return $gateway } # Get endpoint gateway ip string (the second address) based on pod cidr. # For Windows nodes the pod gateway IP address is the first address in the pod # CIDR for the host, but from inside containers it's the second address. function Get_Endpoint_Gateway_From_CIDR([string] $cidr) { $network=Get_NetworkDecimal_From_CIDR($cidr) $gateway=ConvertTo_DottedDecimalIP($network+2) return $gateway } # Get pod IP range start based (the third address) on pod cidr # We reserve the first two in the cidr range for gateways. Start the cidr # range from the third so that IPAM does not allocate those IPs to pods. function Get_PodIP_Range_Start([string] $cidr) { $network=Get_NetworkDecimal_From_CIDR($cidr) $start=ConvertTo_DottedDecimalIP($network+3) return $start } # Configures HNS on the Windows node to enable Kubernetes networking: # - Creates the "management" interface associated with an initial HNS network. # - Creates the HNS network $env:KUBE_NETWORK for pod networking. # - Creates an HNS endpoint for pod networking. # - Adds necessary routes on the management interface. # - Verifies that the GCE metadata server connection remains intact. # # Prerequisites: # $env:POD_CIDR is set (by Set-PodCidr). # Download-HelperScripts() has been called. function Configure-HostNetworkingService { Import-Module -Force ${env:K8S_DIR}\hns.psm1 Add_InitialHnsNetwork $pod_gateway = Get_Gateway_From_CIDR(${env:POD_CIDR}) $pod_endpoint_gateway = Get_Endpoint_Gateway_From_CIDR(${env:POD_CIDR}) Log-Output ("Setting up Windows node HNS networking: " + "podCidr = ${env:POD_CIDR}, podGateway = ${pod_gateway}, " + "podEndpointGateway = ${pod_endpoint_gateway}") $hns_network = Get-HnsNetwork | Where-Object Name -eq ${env:KUBE_NETWORK} if ($hns_network) { if ($REDO_STEPS) { Log-Output ("Warning: ${env:KUBE_NETWORK} HNS network already exists, " + "removing it and recreating it") $hns_network | Remove-HnsNetwork $hns_network = $null } else { Log-Output "Skip: ${env:KUBE_NETWORK} HNS network already exists" } } $created_hns_network = $false if (-not $hns_network) { # Note: RDP connection will hiccup when running this command. $hns_network = New-HNSNetwork ` -Type "L2Bridge" ` -AddressPrefix ${env:POD_CIDR} ` -Gateway ${pod_gateway} ` -Name ${env:KUBE_NETWORK} ` -Verbose $created_hns_network = $true } # This name of endpoint is referred in pkg/proxy/winkernel/proxier.go as part of # kube-proxy as well. A health check port for every service that is specified as # "externalTrafficPolicy: local" will be added on the endpoint. # PLEASE KEEP THEM CONSISTENT!!! $endpoint_name = "cbr0" $vnic_name = "vEthernet (${endpoint_name})" $hns_endpoint = Get-HnsEndpoint | Where-Object Name -eq $endpoint_name # Note: we don't expect to ever enter this block currently - while the HNS # network does seem to persist across reboots, the HNS endpoints do not. if ($hns_endpoint) { if ($REDO_STEPS) { Log-Output ("Warning: HNS endpoint $endpoint_name already exists, " + "removing it and recreating it") $hns_endpoint | Remove-HnsEndpoint $hns_endpoint = $null } else { Log-Output "Skip: HNS endpoint $endpoint_name already exists" } } if (-not $hns_endpoint) { $hns_endpoint = New-HnsEndpoint ` -NetworkId ${hns_network}.Id ` -Name ${endpoint_name} ` -IPAddress ${pod_endpoint_gateway} ` -Gateway "0.0.0.0" ` -Verbose # TODO(pjh): find out: why is this always CompartmentId 1? Attach-HnsHostEndpoint ` -EndpointID ${hns_endpoint}.Id ` -CompartmentID 1 ` -Verbose netsh interface ipv4 set interface "${vnic_name}" forwarding=enabled } Try { Get-HNSPolicyList | Remove-HnsPolicyList } Catch { } # Add a route from the management NIC to the pod CIDR. # # When a packet from a Kubernetes service backend arrives on the destination # Windows node, the reverse SNAT will be applied and the source address of # the packet gets replaced from the pod IP to the service VIP. The packet # will then leave the VM and return back through hairpinning. # # When IP alias is enabled, IP forwarding is disabled for anti-spoofing; # the packet with the service VIP will get blocked and be lost. With this # route, the packet will be routed to the pod subnetwork, and not leave the # VM. $mgmt_net_adapter = Get_MgmtNetAdapter New-NetRoute ` -ErrorAction Ignore ` -InterfaceAlias ${mgmt_net_adapter}.ifAlias ` -DestinationPrefix ${env:POD_CIDR} ` -NextHop "0.0.0.0" ` -Verbose if ($created_hns_network) { # There is an HNS bug where the route to the GCE metadata server will be # removed when the HNS network is created: # https://github.com/Microsoft/hcsshim/issues/299#issuecomment-425491610. # The behavior here is very unpredictable: the route may only be removed # after some delay, or it may appear to be removed then you'll add it back # but then it will be removed once again. So, we first wait a long # unfortunate amount of time to ensure that things have quiesced, then we # wait until we're sure the route is really gone before re-adding it again. Log-Output "Waiting 45 seconds for host network state to quiesce" Start-Sleep 45 WaitFor_GceMetadataServerRouteToBeRemoved Log-Output "Re-adding the GCE metadata server route" Add_GceMetadataServerRoute } Verify_GceMetadataServerRouteIsPresent Log-Output "Host network setup complete" } function Configure-GcePdTools { if (ShouldWrite-File ${env:K8S_DIR}\GetGcePdName.dll) { MustDownload-File -OutFile ${env:K8S_DIR}\GetGcePdName.dll ` -URLs "https://storage.googleapis.com/gke-release/winnode/config/gce-tools/master/GetGcePdName/GetGcePdName.dll" } if (-not (Test-Path $PsHome\profile.ps1)) { New-Item -path $PsHome\profile.ps1 -type file } Add-Content $PsHome\profile.ps1 ` '$modulePath = "K8S_DIR\GetGcePdName.dll" Unblock-File $modulePath Import-Module -Name $modulePath'.replace('K8S_DIR', ${env:K8S_DIR}) } # Setup cni network for containerd. function Prepare-CniNetworking { Configure_Containerd_CniNetworking } # Obtain the host dns conf and save it to a file so that kubelet/CNI # can use it to configure dns suffix search list for pods. # The value of DNS server is ignored right now because the pod will # always only use cluster DNS service, but for consistency, we still # parsed them here in the same format as Linux resolv.conf. # This function must be called after Configure-HostNetworkingService. function Configure-HostDnsConf { $net_adapter = Get_MgmtNetAdapter $server_ips = (Get-DnsClientServerAddress ` -InterfaceAlias ${net_adapter}.Name).ServerAddresses $search_list = (Get-DnsClient).ConnectionSpecificSuffixSearchList $conf = "" ForEach ($ip in $server_ips) { $conf = $conf + "nameserver $ip`r`n" } $conf = $conf + "search $search_list" # Do not put hostdns.conf into the CNI config directory so as to # avoid the container runtime treating it as CNI config. $hostdns_conf = "${env:CNI_DIR}\hostdns.conf" New-Item -Force -ItemType file ${hostdns_conf} | Out-Null Set-Content ${hostdns_conf} $conf Log-Output "HOST dns conf:`n$(Get-Content -Raw ${hostdns_conf})" } # Fetches the kubelet config from the instance metadata and puts it at # $env:KUBELET_CONFIG. function Configure-Kubelet { if (-not (ShouldWrite-File ${env:KUBELET_CONFIG})) { return } # The Kubelet config is built by build-kubelet-config() in # cluster/gce/util.sh, and stored in the metadata server under the # 'kubelet-config' key. $kubelet_config = Get-InstanceMetadataAttribute 'kubelet-config' Set-Content ${env:KUBELET_CONFIG} $kubelet_config Log-Output "Kubelet config:`n$(Get-Content -Raw ${env:KUBELET_CONFIG})" } # Sets up the kubelet and kube-proxy arguments and starts them as native # Windows services. # # Required ${kube_env} keys: # KUBELET_ARGS # KUBEPROXY_ARGS # CLUSTER_IP_RANGE function Start-WorkerServices { # Compute kubelet args $kubelet_args_str = ${kube_env}['KUBELET_ARGS'] $kubelet_args = $kubelet_args_str.Split(" ") Log-Output "kubelet_args from metadata: ${kubelet_args}" # To join GCE instances to AD, we need to shorten their names, as NetBIOS name # must be <= 15 characters, and GKE generated names are longer than that. # To perform the join in an automated way, it's preferable to apply the rename # and domain join in the GCESysprep step. However, after sysprep is complete # and the machine restarts, kubelet bootstrapping should not use the shortened # computer name, and instead use the instance's name by using --hostname-override, # otherwise kubelet and kube-proxy will not be able to run properly. $instance_name = "$(Get-InstanceMetadata 'name' | Out-String)" $default_kubelet_args = @(` "--pod-infra-container-image=${env:INFRA_CONTAINER}", "--hostname-override=${instance_name}" ) $kubelet_args = ${default_kubelet_args} + ${kubelet_args} Log-Output 'Using bootstrap kubeconfig for authentication' $kubelet_args = (${kubelet_args} + "--bootstrap-kubeconfig=${env:BOOTSTRAP_KUBECONFIG}") Log-Output "Final kubelet_args: ${kubelet_args}" # Compute kube-proxy args $kubeproxy_args_str = ${kube_env}['KUBEPROXY_ARGS'] $kubeproxy_args = $kubeproxy_args_str.Split(" ") Log-Output "kubeproxy_args from metadata: ${kubeproxy_args}" # kubeproxy is started on Linux nodes using # kube-manifests/kubernetes/gci-trusty/kube-proxy.manifest, which is # generated by start-kube-proxy in configure-helper.sh and contains e.g.: # kube-proxy --master=https://35.239.84.171 # --kubeconfig=/var/lib/kube-proxy/kubeconfig --cluster-cidr=10.64.0.0/14 # --oom-score-adj=-998 --v=2 # --iptables-sync-period=1m --iptables-min-sync-period=10s # --ipvs-sync-period=1m --ipvs-min-sync-period=10s # And also with various volumeMounts and "securityContext: privileged: true". $default_kubeproxy_args = @(` "--kubeconfig=${env:KUBEPROXY_KUBECONFIG}", "--cluster-cidr=$(${kube_env}['CLUSTER_IP_RANGE'])", "--hostname-override=${instance_name}" ) $kubeproxy_args = ${default_kubeproxy_args} + ${kubeproxy_args} Log-Output "Final kubeproxy_args: ${kubeproxy_args}" # TODO(pjh): kubelet is emitting these messages: # I1023 23:44:11.761915 2468 kubelet.go:274] Adding pod path: # C:\etc\kubernetes # I1023 23:44:11.775601 2468 file.go:68] Watching path # "C:\\etc\\kubernetes" # ... # E1023 23:44:31.794327 2468 file.go:182] Can't process manifest file # "C:\\etc\\kubernetes\\hns.psm1": C:\etc\kubernetes\hns.psm1: couldn't parse # as pod(yaml: line 10: did not find expected <document start>), please check # config file. # # Figure out how to change the directory that the kubelet monitors for new # pod manifests. # We configure the service to restart on failure, after 10s wait. We reset # the restart count to 0 each time, so we re-use our restart/10000 action on # each failure. Note it currently restarts even when explicitly stopped, you # have to delete the service entry to *really* kill it (e.g. `sc.exe delete # kubelet`). See issue #72900. if (Get-Process | Where-Object Name -eq "kubelet") { Log-Output -Fatal ` "A kubelet process is already running, don't know what to do" } Log-Output "Creating kubelet service" & sc.exe create kubelet binPath= "${env:NODE_DIR}\kube-log-runner.exe -log-file=${env:LOGS_DIR}\kubelet.log ${env:NODE_DIR}\kubelet.exe ${kubelet_args}" start= demand & sc.exe failure kubelet reset= 0 actions= restart/10000 Log-Output "Starting kubelet service" & sc.exe start kubelet Log-Output "Waiting 10 seconds for kubelet to stabilize" Start-Sleep 10 Write-VerboseServiceInfoToConsole -Service 'kubelet' if (Get-Process | Where-Object Name -eq "kube-proxy") { Log-Output -Fatal ` "A kube-proxy process is already running, don't know what to do" } Log-Output "Creating kube-proxy service" & sc.exe create kube-proxy binPath= "${env:NODE_DIR}\kube-log-runner.exe -log-file=${env:LOGS_DIR}\kube-proxy.log ${env:NODE_DIR}\kube-proxy.exe ${kubeproxy_args}" start= demand & sc.exe failure kube-proxy reset= 0 actions= restart/10000 Log-Output "Starting kube-proxy service" & sc.exe start kube-proxy Write-VerboseServiceInfoToConsole -Service 'kube-proxy' -Delay 1 # F1020 23:08:52.000083 9136 server.go:361] unable to load in-cluster # configuration, KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT must be # defined # TODO(pjh): still getting errors like these in kube-proxy log: # E1023 04:03:58.143449 4840 reflector.go:205] k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:129: Failed to list *core.Endpoints: Get https://35.239.84.171/api/v1/endpoints?limit=500&resourceVersion=0: dial tcp 35.239.84.171:443: connectex: A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond. # E1023 04:03:58.150266 4840 reflector.go:205] k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:129: Failed to list *core.Service: Get https://35.239.84.171/api/v1/services?limit=500&resourceVersion=0: dial tcp 35.239.84.171:443: connectex: A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond. WaitFor_KubeletAndKubeProxyReady Verify_GceMetadataServerRouteIsPresent Log-Output "Kubernetes components started successfully" } # Stop and unregister both kubelet & kube-proxy services. function Unregister-WorkerServices { & sc.exe delete kube-proxy & sc.exe delete kubelet } # Wait for kubelet and kube-proxy to be ready within 10s. function WaitFor_KubeletAndKubeProxyReady { $waited = 0 $timeout = 10 while (((Get-Service kube-proxy).Status -ne 'Running' -or (Get-Service kubelet).Status -ne 'Running') -and $waited -lt $timeout) { Start-Sleep 1 $waited++ } # Timeout occurred if ($waited -ge $timeout) { Log-Output "$(Get-Service kube* | Out-String)" Throw ("Timeout while waiting ${timeout} seconds for kubelet and kube-proxy services to start") } } # Runs 'kubectl get nodes'. # Runs additional verification commands to ensure node successfully joined cluster # and that it connects to the API Server. function Verify-WorkerServices { $timeout = 12 $retries = 0 $retryDelayInSeconds = 5 Log-Output ("Testing node connection to API server...") do { $retries++ $nodes_list = & "${env:NODE_DIR}\kubectl.exe" get nodes -o=custom-columns=:.metadata.name -A | Out-String $host_status = & "${env:NODE_DIR}\kubectl.exe" get nodes (hostname) -o=custom-columns=:.status.conditions[4].type | Out-String Start-Sleep $retryDelayInSeconds } while (((-Not $nodes_list) -or (-Not $nodes_list.contains((hostname))) -or (-Not $host_status.contains("Ready")))-and ($retries -le $timeout)) If (-Not $nodes_list){ Throw ("Node: '$(hostname)' failed to connect to API server") }ElseIf (-Not $nodes_list.contains((hostname))) { Throw ("Node: '$(hostname)' failed to join the cluster; NODES: '`n $($nodes_list)'") }ELseIf (-Not $host_status.contains("Ready")) { Throw ("Node: '$(hostname)' is not in Ready state") } Log-Output ("Node: $(hostname) successfully joined cluster `n NODES: `n $($nodes_list)") Verify_GceMetadataServerRouteIsPresent } # Downloads the Windows crictl package and installs its contents (e.g. # crictl.exe) in $env:NODE_DIR. function DownloadAndInstall-Crictl { if (-not (ShouldWrite-File ${env:NODE_DIR}\crictl.exe)) { return } $CRI_TOOLS_GCS_BUCKET = 'k8s-artifacts-cri-tools' $url = ('https://storage.googleapis.com/' + $CRI_TOOLS_GCS_BUCKET + '/release/' + $CRICTL_VERSION + '/crictl-' + $CRICTL_VERSION + '-windows-amd64.tar.gz') MustDownload-File ` -URLs $url ` -OutFile ${env:NODE_DIR}\crictl.tar.gz ` -Hash $CRICTL_SHA256 ` -Algorithm SHA256 tar xzvf ${env:NODE_DIR}\crictl.tar.gz -C ${env:NODE_DIR} } # Sets crictl configuration values. function Configure-Crictl { if (${env:CONTAINER_RUNTIME_ENDPOINT}) { & "${env:NODE_DIR}\crictl.exe" config runtime-endpoint ` ${env:CONTAINER_RUNTIME_ENDPOINT} } } # Pulls the infra/pause container image onto the node so that it will be # immediately available when the kubelet tries to run pods. # TODO(pjh): downloading the container container image may take a few minutes; # figure out how to run this in the background while perform the rest of the # node startup steps! # Pull-InfraContainer must be called AFTER Verify-WorkerServices. function Pull-InfraContainer { $name, $label = ${env:INFRA_CONTAINER} -split ':',2 if (-not ("$(& crictl images)" -match "$name.*$label")) { & crictl pull ${env:INFRA_CONTAINER} if (!$?) { throw "Error running 'crictl pull ${env:INFRA_CONTAINER}'" } } $inspect = "$(& crictl inspecti ${env:INFRA_CONTAINER} | Out-String)" Log-Output "Infra/pause container:`n$inspect" } # Setup the containerd on the node. function Setup-ContainerRuntime { Install-Pigz Install_Containerd Configure_Containerd Start_Containerd } function Test-ContainersFeatureInstalled { return (Get-WindowsFeature Containers).Installed } # After this function returns, the computer must be restarted to complete # the installation! function Install-ContainersFeature { Log-Output "Installing Windows 'Containers' feature" Install-WindowsFeature Containers } # Verifies if Hyper-V should be enabled in the node function Test-ShouldEnableHyperVFeature { return "${env:WINDOWS_ENABLE_HYPERV}" -eq "true" } # Check if Hyper-V feature is enabled function Test-HyperVFeatureEnabled { return ((Get-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V).State -eq 'Enabled') } # After this function returns, the computer must be restarted to complete # the installation! function Enable-HyperVFeature { Log-Output "Enabling Windows 'HyperV' feature" Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V -All -NoRestart Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V-Management-PowerShell -All -NoRestart } # Configures the TCP/IP parameters to be in sync with the GCP recommendation. # Not setting these values correctly can cause network issues for connections # that live longer than 10 minutes. # See: https://cloud.google.com/compute/docs/troubleshooting/general-tips#idle-connections function Set-WindowsTCPParameters { Set-ItemProperty -Force -Confirm:$false -Path ` 'HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters' ` -Name 'KeepAliveInterval' -Type Dword -Value 1000 Set-ItemProperty -Force -Confirm:$false ` -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters' ` -Name 'KeepAliveTime' -Type Dword -Value 60000 Set-ItemProperty -Force -Confirm:$false ` -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters' ` -Name 'TcpMaxDataRetransmissions' -Type Dword -Value 10 Log-Output 'TCP/IP Parameters' Get-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters' } # Writes a CNI config file under $env:CNI_CONFIG_DIR for containerd. # # Prerequisites: # $env:POD_CIDR is set (by Set-PodCidr). # The "management" interface exists (Configure-HostNetworkingService). # The HNS network for pod networking has been configured # (Configure-HostNetworkingService). # Containerd is installed (Install_Containerd). # # Required ${kube_env} keys: # DNS_SERVER_IP # DNS_DOMAIN # SERVICE_CLUSTER_IP_RANGE function Configure_Containerd_CniNetworking { $l2bridge_conf = "${env:CNI_CONFIG_DIR}\l2bridge.conf" if (-not (ShouldWrite-File ${l2bridge_conf})) { return } $mgmt_ip = (Get_MgmtNetAdapter | Get-NetIPAddress -AddressFamily IPv4).IPAddress $pod_gateway = Get_Endpoint_Gateway_From_CIDR(${env:POD_CIDR}) # Explanation of the CNI config values: # POD_CIDR: the pod CIDR assigned to this node. # POD_GATEWAY: the gateway IP. # MGMT_IP: the IP address assigned to the node's primary network interface # (i.e. the internal IP of the GCE VM). # SERVICE_CIDR: the CIDR used for kubernetes services. # DNS_SERVER_IP: the cluster's DNS server IP address. # DNS_DOMAIN: the cluster's DNS domain, e.g. "cluster.local". # # OutBoundNAT ExceptionList: No SNAT for CIDRs in the list, the same as default GKE non-masquerade destination ranges listed at https://cloud.google.com/kubernetes-engine/docs/how-to/ip-masquerade-agent#default-non-masq-dests New-Item -Force -ItemType file ${l2bridge_conf} | Out-Null Set-Content ${l2bridge_conf} ` '{ "cniVersion": "0.2.0", "name": "l2bridge", "type": "sdnbridge", "master": "Ethernet", "capabilities": { "portMappings": true, "dns": true }, "ipam": { "subnet": "POD_CIDR", "routes": [ { "GW": "POD_GATEWAY" } ] }, "dns": { "Nameservers": [ "DNS_SERVER_IP" ], "Search": [ "DNS_DOMAIN" ] }, "AdditionalArgs": [ { "Name": "EndpointPolicy", "Value": { "Type": "OutBoundNAT", "Settings": { "Exceptions": [ "169.254.0.0/16", "10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16", "100.64.0.0/10", "192.0.0.0/24", "192.0.2.0/24", "192.88.99.0/24", "198.18.0.0/15", "198.51.100.0/24", "203.0.113.0/24", "240.0.0.0/4" ] } } }, { "Name": "EndpointPolicy", "Value": { "Type": "SDNRoute", "Settings": { "DestinationPrefix": "SERVICE_CIDR", "NeedEncap": true } } }, { "Name": "EndpointPolicy", "Value": { "Type": "SDNRoute", "Settings": { "DestinationPrefix": "MGMT_IP/32", "NeedEncap": true } } } ] }'.replace('POD_CIDR', ${env:POD_CIDR}).` replace('POD_GATEWAY', ${pod_gateway}).` replace('DNS_SERVER_IP', ${kube_env}['DNS_SERVER_IP']).` replace('DNS_DOMAIN', ${kube_env}['DNS_DOMAIN']).` replace('MGMT_IP', ${mgmt_ip}).` replace('SERVICE_CIDR', ${kube_env}['SERVICE_CLUSTER_IP_RANGE']) Log-Output "containerd CNI config:`n$(Get-Content -Raw ${l2bridge_conf})" } # Download and install containerd and CNI binaries into $env:NODE_DIR. function Install_Containerd { # Assume that presence of containerd.exe indicates that all containerd # binaries were already previously downloaded to this node. if (-not (ShouldWrite-File ${env:NODE_DIR}\containerd.exe)) { return } $tmp_dir = 'C:\containerd_tmp' New-Item $tmp_dir -ItemType 'directory' -Force | Out-Null # TODO(ibrahimab) Change this to a gcs bucket with CI maintained and accessible by community. $version = '1.6.2' $tar_url = ("https://github.com/containerd/containerd/releases/download/v${version}/" + "cri-containerd-cni-${version}-windows-amd64.tar.gz") $sha_url = $tar_url + ".sha256sum" MustDownload-File -URLs $sha_url -OutFile $tmp_dir\sha256sum $sha = $(Get-Content $tmp_dir\sha256sum).Split(" ")[0].ToUpper() MustDownload-File ` -URLs $tar_url ` -OutFile $tmp_dir\containerd.tar.gz ` -Hash $sha ` -Algorithm SHA256 tar xzvf $tmp_dir\containerd.tar.gz -C $tmp_dir Move-Item -Force $tmp_dir\cni\bin\*.exe "${env:CNI_DIR}\" Move-Item -Force $tmp_dir\*.exe "${env:NODE_DIR}\" Remove-Item -Force -Recurse $tmp_dir # Exclusion for Defender. Add-MpPreference -ExclusionProcess "${env:NODE_DIR}\containerd.exe" } # Lookup the path of containerd config if exists, else returns a default. function Get_Containerd_ConfigPath { $service = Get-WMIObject -Class Win32_Service -Filter "Name='containerd'" if (!($service -eq $null) -and $service.PathName -match ".*\s--config\s*(\S+).*" -and $matches.Count -eq 2) { return $matches[1] } else { return 'C:\Program Files\containerd\config.toml' } } # Generates the containerd config.toml file. function Configure_Containerd { $config_path = Get_Containerd_ConfigPath $config_dir = [System.IO.Path]::GetDirectoryName($config_path) New-Item $config_dir -ItemType 'directory' -Force | Out-Null Set-Content ${config_path} @" [plugins.scheduler] schedule_delay = '0s' startup_delay = '0s' [plugins.cri] sandbox_image = 'INFRA_CONTAINER_IMAGE' [plugins.cri.containerd] snapshotter = 'windows' default_runtime_name = 'runhcs-wcow-process' disable_snapshot_annotations = true discard_unpacked_layers = true [plugins.cri.cni] bin_dir = 'CNI_BIN_DIR' conf_dir = 'CNI_CONF_DIR' "@.replace('INFRA_CONTAINER_IMAGE', ${env:INFRA_CONTAINER}).` replace('CNI_BIN_DIR', "${env:CNI_DIR}").` replace('CNI_CONF_DIR', "${env:CNI_CONFIG_DIR}") } # Register if needed and start containerd service. function Start_Containerd { # Do the registration only if the containerd service does not exist. if ((Get-WMIObject -Class Win32_Service -Filter "Name='containerd'") -eq $null) { Log-Output "Creating containerd service" & containerd.exe --register-service --log-file "${env:LOGS_DIR}/containerd.log" } Log-Output "Starting containerd service" Restart-Service containerd } # Pigz Resources $PIGZ_ROOT = 'C:\pigz' $PIGZ_VERSION = '2.3.1' $PIGZ_TAR_URL = "https://storage.googleapis.com/gke-release/winnode/pigz/prod/gke_windows/pigz/release/5/20201104-134221/pigz-$PIGZ_VERSION.zip" $PIGZ_TAR_HASH = '5a6f8f5530acc85ea51797f58c1409e5af6b69e55da243ffc608784cf14fec0cd16f74cc61c564d69e1a267750aecfc1e4c53b5219ff5f893b42a7576306f34c' # Install Pigz (https://github.com/madler/pigz) into Windows for improved image # extraction performance. function Install-Pigz { if ("${env:WINDOWS_ENABLE_PIGZ}" -eq "true") { if (-not (Test-Path $PIGZ_ROOT)) { Log-Output "Installing Pigz $PIGZ_VERSION" New-Item -Path $PIGZ_ROOT -ItemType Directory MustDownload-File ` -Url $PIGZ_TAR_URL ` -OutFile "$PIGZ_ROOT\pigz-$PIGZ_VERSION.zip" ` -Hash $PIGZ_TAR_HASH ` -Algorithm SHA512 Expand-Archive -Path "$PIGZ_ROOT\pigz-$PIGZ_VERSION.zip" ` -DestinationPath $PIGZ_ROOT Remove-Item -Path "$PIGZ_ROOT\pigz-$PIGZ_VERSION.zip" # Containerd search for unpigz.exe on the first container image # pull request after the service is started. If unpigz.exe is in the # Windows path it'll use it instead of the default unzipper. # See: https://github.com/containerd/containerd/issues/1896 Add-MachineEnvironmentPath -Path $PIGZ_ROOT # Add process exclusion for Windows Defender to boost performance. Add-MpPreference -ExclusionProcess "$PIGZ_ROOT\unpigz.exe" Log-Output "Installed Pigz $PIGZ_VERSION" } else { Log-Output "Pigz already installed." } } } # Node Problem Detector Resources $NPD_SERVICE = "node-problem-detector" $DEFAULT_NPD_VERSION = '0.8.10-gke0.1' $DEFAULT_NPD_RELEASE_PATH = 'https://storage.googleapis.com/gke-release/winnode' $DEFAULT_NPD_HASH = '97ddfe3544da9e02a1cfb55d24f329eb29d606fca7fbbf800415d5de9dbc29a00563f8e0d1919595c8e316fd989d45b09b13c07be528841fc5fd37e21d016a2d' # Install Node Problem Detector (NPD). # NPD analyzes the host for problems that can disrupt workloads. # https://github.com/kubernetes/node-problem-detector function DownloadAndInstall-NodeProblemDetector { if ("${env:ENABLE_NODE_PROBLEM_DETECTOR}" -eq "standalone") { if (ShouldWrite-File "${env:NODE_DIR}\node-problem-detector.exe") { $npd_version = $DEFAULT_NPD_VERSION $npd_hash = $DEFAULT_NPD_HASH if (-not [string]::IsNullOrEmpty(${kube_env}['NODE_PROBLEM_DETECTOR_VERSION'])) { $npd_version = ${kube_env}['NODE_PROBLEM_DETECTOR_VERSION'] $npd_hash = ${kube_env}['NODE_PROBLEM_DETECTOR_TAR_HASH'] } $npd_release_path = $DEFAULT_NPD_RELEASE_PATH if (-not [string]::IsNullOrEmpty(${kube_env}['NODE_PROBLEM_DETECTOR_RELEASE_PATH'])) { $npd_release_path = ${kube_env}['NODE_PROBLEM_DETECTOR_RELEASE_PATH'] } $npd_tar = "node-problem-detector-v${npd_version}-windows_amd64.tar.gz" Log-Output "Downloading ${npd_tar}." $npd_dir = "${env:K8S_DIR}\node-problem-detector" New-Item -Path $npd_dir -ItemType Directory -Force -Confirm:$false MustDownload-File ` -URLs "${npd_release_path}/node-problem-detector/${npd_tar}" ` -Hash $npd_hash ` -Algorithm SHA512 ` -OutFile "${npd_dir}\${npd_tar}" tar xzvf "${npd_dir}\${npd_tar}" -C $npd_dir Move-Item "${npd_dir}\bin\*" "${env:NODE_DIR}\" -Force -Confirm:$false Remove-Item "${npd_dir}\bin" -Force -Confirm:$false Remove-Item "${npd_dir}\${npd_tar}" -Force -Confirm:$false } else { Log-Output "Node Problem Detector already installed." } } } # Creates the node-problem-detector user kubeconfig file at # $env:NODEPROBLEMDETECTOR_KUBECONFIG_FILE (if defined). # # Create-NodePki() must be called first. # # Required ${kube_env} keys: # CA_CERT # NODE_PROBLEM_DETECTOR_TOKEN function Create-NodeProblemDetectorKubeConfig { if (-not [string]::IsNullOrEmpty(${env:NODEPROBLEMDETECTOR_KUBECONFIG_FILE})) { Create-Kubeconfig -Name 'node-problem-detector' ` -Path ${env:NODEPROBLEMDETECTOR_KUBECONFIG_FILE} ` -Token ${kube_env}['NODE_PROBLEM_DETECTOR_TOKEN'] } } # Configures NPD to run with the bundled monitor configs and report against the Kubernetes api server. function Configure-NodeProblemDetector { $npd_bin = "${env:NODE_DIR}\node-problem-detector.exe" if ("${env:ENABLE_NODE_PROBLEM_DETECTOR}" -eq "standalone" -and (Test-Path $npd_bin)) { $npd_svc = Get-Service -Name $NPD_SERVICE -ErrorAction SilentlyContinue if ($npd_svc -eq $null) { $npd_dir = "${env:K8S_DIR}\node-problem-detector" $npd_logs_dir = "${env:LOGS_DIR}\node-problem-detector" New-Item -Path $npd_logs_dir -Type Directory -Force -Confirm:$false $flags = '' if ([string]::IsNullOrEmpty(${kube_env}['NODE_PROBLEM_DETECTOR_CUSTOM_FLAGS'])) { $system_log_monitors = @() $system_stats_monitors = @() $custom_plugin_monitors = @() # Custom Plugin Monitors $custom_plugin_monitors += @("${npd_dir}\config\windows-health-checker-kubelet.json") $custom_plugin_monitors += @("${npd_dir}\config\windows-health-checker-kubeproxy.json") $custom_plugin_monitors += @("${npd_dir}\config\windows-defender-monitor.json") # System Stats Monitors $system_stats_monitors += @("${npd_dir}\config\windows-system-stats-monitor.json") # NPD Configuration for CRI monitor $system_log_monitors += @("${npd_dir}\config\windows-containerd-monitor-filelog.json") $custom_plugin_monitors += @("${npd_dir}\config\windows-health-checker-containerd.json") $flags="--v=2 --port=20256 --log_dir=${npd_logs_dir}" if ($system_log_monitors.count -gt 0) { $flags+=" --config.system-log-monitor={0}" -f ($system_log_monitors -join ",") } if ($system_stats_monitors.count -gt 0) { $flags+=" --config.system-stats-monitor={0}" -f ($system_stats_monitors -join ",") } if ($custom_plugin_monitors.count -gt 0) { $flags+=" --config.custom-plugin-monitor={0}" -f ($custom_plugin_monitors -join ",") } } else { $flags = ${kube_env}['NODE_PROBLEM_DETECTOR_CUSTOM_FLAGS'] } $kubernetes_master_name = ${kube_env}['KUBERNETES_MASTER_NAME'] $flags = "${flags} --apiserver-override=`"https://${kubernetes_master_name}?inClusterConfig=false&auth=${env:NODEPROBLEMDETECTOR_KUBECONFIG_FILE}`"" Log-Output "Creating service: ${NPD_SERVICE}" Log-Output "${npd_bin} ${flags}" sc.exe create $NPD_SERVICE binpath= "${npd_bin} ${flags}" displayName= "Node Problem Detector" sc.exe failure $NPD_SERVICE reset= 30 actions= restart/5000 sc.exe start $NPD_SERVICE Write-VerboseServiceInfoToConsole -Service $NPD_SERVICE } else { Log-Output "${NPD_SERVICE} already configured." } } } # TODO(pjh): move the logging agent code below into a separate # module; it was put here temporarily to avoid disrupting the file layout in # the K8s release machinery. $LOGGINGAGENT_VERSION = '1.8.10' $LOGGINGAGENT_ROOT = 'C:\fluent-bit' $LOGGINGAGENT_SERVICE = 'fluent-bit' $LOGGINGAGENT_CMDLINE = '*fluent-bit.exe*' $LOGGINGEXPORTER_VERSION = 'v0.17.0' $LOGGINGEXPORTER_ROOT = 'C:\flb-exporter' $LOGGINGEXPORTER_SERVICE = 'flb-exporter' $LOGGINGEXPORTER_CMDLINE = '*flb-exporter.exe*' $LOGGINGEXPORTER_HASH = 'c808c9645d84b06b89932bd707d51a9d1d0b451b5a702a5f9b2b4462c8be6502' # Restart Logging agent or starts it if it is not currently running function Restart-LoggingAgent { if (IsStackdriverAgentInstalled) { Restart-StackdriverAgent return } Restart-LogService $LOGGINGEXPORTER_SERVICE $LOGGINGEXPORTER_CMDLINE Restart-LogService $LOGGINGAGENT_SERVICE $LOGGINGAGENT_CMDLINE } # Restarts the service, or starts it if it is not currently # running. A standard `Restart-Service` may fail because # the process is sometimes unstoppable, so this function works around it # by killing the processes. function Restart-LogService([string]$service, [string]$cmdline) { Stop-Service -NoWait -ErrorAction Ignore $service # Wait (if necessary) for service to stop. $timeout = 10 $stopped = (Get-service $service).Status -eq 'Stopped' for ($i = 0; $i -lt $timeout -and !($stopped); $i++) { Start-Sleep 1 $stopped = (Get-service $service).Status -eq 'Stopped' } if ((Get-service $service).Status -ne 'Stopped') { # Force kill the processes. Stop-Process -Force -PassThru -Id (Get-WmiObject win32_process | Where CommandLine -Like $cmdline).ProcessId # Wait until process has stopped. $waited = 0 $log_period = 10 $timeout = 60 while ((Get-service $service).Status -ne 'Stopped' -and $waited -lt $timeout) { Start-Sleep 1 $waited++ if ($waited % $log_period -eq 0) { Log-Output "Waiting for ${service} service to stop" } } # Timeout occurred if ($waited -ge $timeout) { Throw ("Timeout while waiting for ${service} service to stop") } } Start-Service $service } # Check whether the logging agent is installed by whether it's registered as service function IsLoggingAgentInstalled { $logging_status = (Get-Service $LOGGINGAGENT_SERVICE -ErrorAction Ignore).Status return -not [string]::IsNullOrEmpty($logging_status) } # Installs the logging agent according to https://docs.fluentbit.io/manual/installation/windows# # Also installs fluent bit stackdriver exporter function Install-LoggingAgent { if (IsStackdriverAgentInstalled) { # Remove the existing storage.json file if it exists. This is a workaround # for the bug where the logging agent cannot start up if the file is # corrupted. Remove-Item ` -Force ` -ErrorAction Ignore ` ("$STACKDRIVER_ROOT\LoggingAgent\Main\pos\winevtlog.pos\worker0\" + "storage.json") Log-Output ("Skip: Stackdriver logging agent is already installed") return } if (IsLoggingAgentInstalled) { # Note: we should reinstall the agent if $REDO_STEPS is true # here, but we don't know how to run the installer without it prompting # when logging agent is already installed. We dumped the strings in the # installer binary and searched for flags to do this but found nothing. Oh # well. Log-Output ("Skip: Fluentbit logging agent is already installed") return } DownloadAndInstall-LoggingAgents Create-LoggingAgentServices } function DownloadAndInstall-LoggingAgents { # Install Logging agent if not present if (ShouldWrite-File $LOGGINGAGENT_ROOT\td-agent-bit-${LOGGINGAGENT_VERSION}-win64) { $install_dir = 'C:\flb-installers' $url = ("https://storage.googleapis.com/gke-release/winnode/fluentbit/td-agent-bit-${LOGGINGAGENT_VERSION}-win64.zip") Log-Output 'Downloading Logging agent' New-Item $install_dir -ItemType 'directory' -Force | Out-Null MustDownload-File -OutFile $install_dir\td.zip -URLs $url cd $install_dir Log-Output 'Extracting Logging agent' Expand-Archive td.zip mv .\td\td-agent-bit-${LOGGINGAGENT_VERSION}-win64\ $LOGGINGAGENT_ROOT cd C:\ Remove-Item -Force -Recurse $install_dir } # Download Logging exporter if needed if (ShouldWrite-File $LOGGINGEXPORTER_ROOT\flb-exporter.exe) { $url = ("https://storage.googleapis.com/gke-release/winnode/fluentbit-exporter/${LOGGINGEXPORTER_VERSION}/flb-exporter-${LOGGINGEXPORTER_VERSION}.exe") Log-Output 'Downloading logging exporter' New-Item $LOGGINGEXPORTER_ROOT -ItemType 'directory' -Force | Out-Null MustDownload-File ` -OutFile $LOGGINGEXPORTER_ROOT\flb-exporter.exe ` -URLs $url ` -Hash $LOGGINGEXPORTER_HASH ` -Algorithm SHA256 } } function Create-LoggingAgentServices { cd $LOGGINGAGENT_ROOT Log-Output "Creating service: ${LOGGINGAGENT_SERVICE}" sc.exe create $LOGGINGAGENT_SERVICE binpath= "${LOGGINGAGENT_ROOT}\bin\fluent-bit.exe -c \fluent-bit\conf\fluent-bit.conf" sc.exe failure $LOGGINGAGENT_SERVICE reset= 30 actions= restart/5000 Write-VerboseServiceInfoToConsole -Service $LOGGINGAGENT_SERVICE Log-Output "Creating service: ${LOGGINGEXPORTER_SERVICE}" sc.exe create $LOGGINGEXPORTER_SERVICE binpath= "${LOGGINGEXPORTER_ROOT}\flb-exporter.exe --kubernetes-separator=_ --stackdriver-resource-model=k8s --enable-pod-label-discovery --logtostderr --winsvc --pod-label-dot-replacement=_" sc.exe failure $LOGGINGEXPORTER_SERVICE reset= 30 actions= restart/5000 Write-VerboseServiceInfoToConsole -Service $LOGGINGEXPORTER_SERVICE } # Writes the logging configuration file for Logging agent. Restart-LoggingAgent # should then be called to pick up the new configuration. function Configure-LoggingAgent { if (IsStackdriverAgentInstalled) { Configure-StackdriverAgent return } $fluentbit_config_file = "$LOGGINGAGENT_ROOT\conf\fluent-bit.conf" $FLUENTBIT_CONFIG | Out-File -FilePath $fluentbit_config_file -Encoding ASCII Log-Output "Wrote logging config to $fluentbit_config_file" $fluentbit_parser_file = "$LOGGINGAGENT_ROOT\conf\parsers.conf" $PARSERS_CONFIG | Out-File -FilePath $fluentbit_parser_file -Encoding ASCII # Create directory for all the log position files. New-Item -Type Directory -Path "/var/run/google-fluentbit/pos-files/" -Force | Out-Null Log-Output "Wrote logging config to $fluentbit_parser_file" } # Fluentbit main config file $FLUENTBIT_CONFIG = @' [SERVICE] Flush 5 Grace 120 Log_Level info Log_File /var/log/fluentbit.log Daemon off Parsers_File parsers.conf HTTP_Server off HTTP_Listen 0.0.0.0 HTTP_PORT 2020 plugins_file plugins.conf # Storage # ======= # Fluent Bit can use memory and filesystem buffering based mechanisms # # - https://docs.fluentbit.io/manual/administration/buffering-and-storage # # storage metrics # --------------- # publish storage pipeline metrics in '/api/v1/storage'. The metrics are # exported only if the 'http_server' option is enabled. # # storage.metrics on # storage.path # ------------ # absolute file system path to store filesystem data buffers (chunks). # # storage.path /tmp/storage # storage.sync # ------------ # configure the synchronization mode used to store the data into the # filesystem. It can take the values normal or full. # # storage.sync normal # storage.checksum # ---------------- # enable the data integrity check when writing and reading data from the # filesystem. The storage layer uses the CRC32 algorithm. # # storage.checksum off # storage.backlog.mem_limit # ------------------------- # if storage.path is set, Fluent Bit will look for data chunks that were # not delivered and are still in the storage layer, these are called # backlog data. This option configure a hint of maximum value of memory # to use when processing these records. # # storage.backlog.mem_limit 5M [INPUT] Name winlog Interval_Sec 2 # Channels Setup,Windows PowerShell Channels application,system,security Tag winevt.raw DB /var/run/google-fluentbit/pos-files/winlog.db # Json Log Example: # {"log":"[info:2016-02-16T16:04:05.930-08:00] Some log text here\n","stream":"stdout","time":"2016-02-17T00:04:05.931087621Z"} [INPUT] Name tail Alias kube_containers Tag kube_<namespace_name>_<pod_name>_<container_name> Tag_Regex (?<pod_name>[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*)_(?<namespace_name>[^_]+)_(?<container_name>.+)- Mem_Buf_Limit 5MB Skip_Long_Lines On Refresh_Interval 5 Path C:\var\log\containers\*.log DB /var/run/google-fluentbit/pos-files/flb_kube.db [FILTER] Name parser Match kube_* Key_Name log Reserve_Data True Parser docker Parser containerd # Log line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg # Example: # I0716 02:08:55.559351 3356 log_spam.go:42] Command line arguments: [INPUT] Name tail Alias node-problem-detector Tag node-problem-detector Mem_Buf_Limit 5MB Skip_Long_Lines On Refresh_Interval 5 Path C:\etc\kubernetes\logs\node-problem-detector\*.log.INFO* DB /var/run/google-fluentbit/pos-files/node-problem-detector.db Multiline On Parser_Firstline glog # Example: # I0928 03:15:50.440223 4880 main.go:51] Starting CSI-Proxy Server ... [INPUT] Name tail Alias csi-proxy Tag csi-proxy Mem_Buf_Limit 5MB Skip_Long_Lines On Refresh_Interval 5 Path /etc/kubernetes/logs/csi-proxy.log DB /var/run/google-fluentbit/pos-files/csi-proxy.db Multiline On Parser_Firstline glog # I1118 21:26:53.975789 6 proxier.go:1096] Port "nodePort for kube-system/default-http-backend:http" (:31429/tcp) was open before and is still needed [INPUT] Name tail Alias kube-proxy Tag kube-proxy Mem_Buf_Limit 5MB Skip_Long_Lines On Refresh_Interval 5 Path /etc/kubernetes/logs/kube-proxy.log DB /var/run/google-fluentbit/pos-files/kube-proxy.db Multiline On Parser_Firstline glog # Example: # time="2019-12-10T21:27:59.836946700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 [INPUT] Name tail Alias container-runtime Tag container-runtime Mem_Buf_Limit 5MB Skip_Long_Lines On Refresh_Interval 5 Path /etc/kubernetes/logs/containerd.log DB /var/run/google-fluentbit/pos-files/container-runtime.db # TODO: Add custom parser for containerd logs once format is settled. # Example: # I0204 07:32:30.020537 3368 server.go:1048] POST /stats/container/: (13.972191ms) 200 [[Go-http-client/1.1] 10.244.1.3:40537] [INPUT] Name tail Alias kubelet Tag kubelet Mem_Buf_Limit 5MB Skip_Long_Lines On Refresh_Interval 5 Path /etc/kubernetes/logs/kubelet.log DB /var/run/google-fluentbit/pos-files/kubelet.db Multiline On Parser_Firstline glog [FILTER] Name modify Match * Hard_rename log message [FILTER] Name modify Match winevt.raw Hard_rename Message message [FILTER] Name parser Match kube_* Key_Name message Reserve_Data True Parser glog Parser json [OUTPUT] Name http Match * Host 127.0.0.1 Port 2021 URI /logs header_tag FLUENT-TAG Format msgpack Retry_Limit 2 '@ # Fluentbit parsers config file $PARSERS_CONFIG = @' [PARSER] Name docker Format json Time_Key time Time_Format %Y-%m-%dT%H:%M:%S.%L%z [PARSER] Name containerd Format regex Regex ^(?<time>.+) (?<stream>stdout|stderr) [^ ]* (?<log>.*)$ Time_Key time Time_Format %Y-%m-%dT%H:%M:%S.%L%z [PARSER] Name json Format json [PARSER] Name syslog Format regex Regex ^\<(?<pri>[0-9]+)\>(?<time>[^ ]* {1,2}[^ ]* [^ ]*) (?<host>[^ ]*) (?<ident>[a-zA-Z0-9_\/\.\-]*)(?:\[(?<pid>[0-9]+)\])?(?:[^\:]*\:)? *(?<message>.*)$ Time_Key time Time_Format %b %d %H:%M:%S [PARSER] Name glog Format regex Regex ^(?<severity>\w)(?<time>\d{4} [^\s]*)\s+(?<pid>\d+)\s+(?<source_file>[^ \]]+)\:(?<source_line>\d+)\]\s(?<message>.*)$ Time_Key time Time_Format %m%d %H:%M:%S.%L [PARSER] Name network-log Format json Time_Key timestamp Time_Format %Y-%m-%dT%H:%M:%S.%L%z [PARSER] Name syslog-rfc5424 Format regex Regex ^\<(?<pri>[0-9]{1,5})\>1 (?<time>[^ ]+) (?<host>[^ ]+) (?<ident>[^ ]+) (?<pid>[-0-9]+) (?<msgid>[^ ]+) (?<extradata>(\[(.*?)\]|-)) (?<message>.+)$ Time_Key time Time_Format %Y-%m-%dT%H:%M:%S.%L%z Time_Keep On [PARSER] Name syslog-rfc3164-local Format regex Regex ^\<(?<pri>[0-9]+)\>(?<time>[^ ]* {1,2}[^ ]* [^ ]*) (?<ident>[a-zA-Z0-9_\/\.\-]*)(?:\[(?<pid>[0-9]+)\])?(?:[^\:]*\:)? *(?<message>.*)$ Time_Key time Time_Format %b %d %H:%M:%S Time_Keep On [PARSER] Name syslog-rfc3164 Format regex Regex /^\<(?<pri>[0-9]+)\>(?<time>[^ ]* {1,2}[^ ]* [^ ]*) (?<host>[^ ]*) (?<ident>[a-zA-Z0-9_\/\.\-]*)(?:\[(?<pid>[0-9]+)\])?(?:[^\:]*\:)? *(?<message>.*)$/ Time_Key time Time_Format %b %d %H:%M:%S Time_Keep On [PARSER] Name kube-custom Format regex Regex (?<tag>[^.]+)?\.?(?<pod_name>[a-z0-9](?:[-a-z0-9]*[a-z0-9])?(?:\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*)_(?<namespace_name>[^_]+)_(?<container_name>.+)-(?<docker_id>[a-z0-9]{64})\.log$ '@ # ----------- Stackdriver logging setup -------------------------- # This section would be deprecated soon # $STACKDRIVER_ROOT = 'C:\Program Files (x86)\Stackdriver' # Restarts the Stackdriver logging agent, or starts it if it is not currently # running. A standard `Restart-Service StackdriverLogging` may fail because # StackdriverLogging sometimes is unstoppable, so this function works around it # by killing the processes. function Restart-StackdriverAgent { Stop-Service -NoWait -ErrorAction Ignore StackdriverLogging # Wait (if necessary) for service to stop. $timeout = 10 $stopped = (Get-service StackdriverLogging).Status -eq 'Stopped' for ($i = 0; $i -lt $timeout -and !($stopped); $i++) { Start-Sleep 1 $stopped = (Get-service StackdriverLogging).Status -eq 'Stopped' } if ((Get-service StackdriverLogging).Status -ne 'Stopped') { # Force kill the processes. Stop-Process -Force -PassThru -Id (Get-WmiObject win32_process | Where CommandLine -Like '*Stackdriver/logging*').ProcessId # Wait until process has stopped. $waited = 0 $log_period = 10 $timeout = 60 while ((Get-service StackdriverLogging).Status -ne 'Stopped' -and $waited -lt $timeout) { Start-Sleep 1 $waited++ if ($waited % $log_period -eq 0) { Log-Output "Waiting for StackdriverLogging service to stop" } } # Timeout occurred if ($waited -ge $timeout) { Throw ("Timeout while waiting for StackdriverLogging service to stop") } } Start-Service StackdriverLogging } # Check whether the logging agent is installed by whether it's registered as service function IsStackdriverAgentInstalled { $stackdriver_status = (Get-Service StackdriverLogging -ErrorAction Ignore).Status return -not [string]::IsNullOrEmpty($stackdriver_status) } # Writes the logging configuration file for Stackdriver. Restart-LoggingAgent # should then be called to pick up the new configuration. function Configure-StackdriverAgent { $fluentd_config_dir = "$STACKDRIVER_ROOT\LoggingAgent\config.d" $fluentd_config_file = "$fluentd_config_dir\k8s_containers.conf" # Create a configuration file for kubernetes containers. # The config.d directory should have already been created automatically, but # try creating again just in case. New-Item $fluentd_config_dir -ItemType 'directory' -Force | Out-Null $config = $FLUENTD_CONFIG.replace('NODE_NAME', (hostname)) $config | Out-File -FilePath $fluentd_config_file -Encoding ASCII Log-Output "Wrote fluentd logging config to $fluentd_config_file" # Configure StackdriverLogging to automatically restart on failure after 10 # seconds. The logging agent may die die to various disruptions but can be # resumed. sc.exe failure StackdriverLogging reset= 0 actions= restart/1000/restart/10000 Write-VerboseServiceInfoToConsole -Service 'StackdriverLogging' } # The NODE_NAME placeholder must be replaced with the node's name (hostname). $FLUENTD_CONFIG = @' # This configuration file for Fluentd is used to watch changes to kubernetes # container logs in the directory /var/lib/docker/containers/ and submit the # log records to Google Cloud Logging using the cloud-logging plugin. # # Example # ======= # A line in the Docker log file might look like this JSON: # # {"log":"2014/09/25 21:15:03 Got request with path wombat\\n", # "stream":"stderr", # "time":"2014-09-25T21:15:03.499185026Z"} # # The original tag is derived from the log file's location. # For example a Docker container's logs might be in the directory: # /var/lib/docker/containers/997599971ee6366d4a5920d25b79286ad45ff37a74494f262e3bc98d909d0a7b # and in the file: # 997599971ee6366d4a5920d25b79286ad45ff37a74494f262e3bc98d909d0a7b-json.log # where 997599971ee6... is the Docker ID of the running container. # The Kubernetes kubelet makes a symbolic link to this file on the host # machine in the /var/log/containers directory which includes the pod name, # the namespace name and the Kubernetes container name: # synthetic-logger-0.25lps-pod_default_synth-lgr-997599971ee6366d4a5920d25b79286ad45ff37a74494f262e3bc98d909d0a7b.log # -> # /var/lib/docker/containers/997599971ee6366d4a5920d25b79286ad45ff37a74494f262e3bc98d909d0a7b/997599971ee6366d4a5920d25b79286ad45ff37a74494f262e3bc98d909d0a7b-json.log # The /var/log directory on the host is mapped to the /var/log directory in the container # running this instance of Fluentd and we end up collecting the file: # /var/log/containers/synthetic-logger-0.25lps-pod_default_synth-lgr-997599971ee6366d4a5920d25b79286ad45ff37a74494f262e3bc98d909d0a7b.log # This results in the tag: # var.log.containers.synthetic-logger-0.25lps-pod_default_synth-lgr-997599971ee6366d4a5920d25b79286ad45ff37a74494f262e3bc98d909d0a7b.log # where 'synthetic-logger-0.25lps-pod' is the pod name, 'default' is the # namespace name, 'synth-lgr' is the container name and '997599971ee6..' is # the container ID. # The record reformer is used to extract pod_name, namespace_name and # container_name from the tag and set them in a local_resource_id in the # format of: # 'k8s_container.<NAMESPACE_NAME>.<POD_NAME>.<CONTAINER_NAME>'. # The reformer also changes the tags to 'stderr' or 'stdout' based on the # value of 'stream'. # local_resource_id is later used by google_cloud plugin to determine the # monitored resource to ingest logs against. # Json Log Example: # {"log":"[info:2016-02-16T16:04:05.930-08:00] Some log text here\n","stream":"stdout","time":"2016-02-17T00:04:05.931087621Z"} # CRI Log Example: # 2016-02-17T00:04:05.931087621Z stdout F [info:2016-02-16T16:04:05.930-08:00] Some log text here <source> @type tail path /var/log/containers/*.log pos_file /var/log/gcp-containers.log.pos # Tags at this point are in the format of: # reform.var.log.containers.<POD_NAME>_<NAMESPACE_NAME>_<CONTAINER_NAME>-<CONTAINER_ID>.log tag reform.* read_from_head true <parse> @type multi_format <pattern> format json time_key time time_format %Y-%m-%dT%H:%M:%S.%NZ keep_time_key </pattern> <pattern> format /^(?<time>.+) (?<stream>stdout|stderr) [^ ]* (?<log>.*)$/ time_format %Y-%m-%dT%H:%M:%S.%N%:z </pattern> </parse> </source> # Example: # I0204 07:32:30.020537 3368 server.go:1048] POST /stats/container/: (13.972191ms) 200 [[Go-http-client/1.1] 10.244.1.3:40537] <source> @type tail format multiline multiline_flush_interval 5s format_firstline /^\w\d{4}/ format1 /^(?<severity>\w)(?<time>\d{4} [^\s]*)\s+(?<pid>\d+)\s+(?<source>[^ \]]+)\] (?<message>.*)/ time_format %m%d %H:%M:%S.%N path /etc/kubernetes/logs/kubelet.log pos_file /etc/kubernetes/logs/gcp-kubelet.log.pos tag kubelet </source> # Example: # I1118 21:26:53.975789 6 proxier.go:1096] Port "nodePort for kube-system/default-http-backend:http" (:31429/tcp) was open before and is still needed <source> @type tail format multiline multiline_flush_interval 5s format_firstline /^\w\d{4}/ format1 /^(?<severity>\w)(?<time>\d{4} [^\s]*)\s+(?<pid>\d+)\s+(?<source>[^ \]]+)\] (?<message>.*)/ time_format %m%d %H:%M:%S.%N path /etc/kubernetes/logs/kube-proxy.log pos_file /etc/kubernetes/logs/gcp-kube-proxy.log.pos tag kube-proxy </source> # Example: # I0928 03:15:50.440223 4880 main.go:51] Starting CSI-Proxy Server ... <source> @type tail format multiline multiline_flush_interval 5s format_firstline /^\w\d{4}/ format1 /^(?<severity>\w)(?<time>\d{4} [^\s]*)\s+(?<pid>\d+)\s+(?<source>[^ \]]+)\] (?<message>.*)/ time_format %m%d %H:%M:%S.%N path /etc/kubernetes/logs/csi-proxy.log pos_file /etc/kubernetes/logs/gcp-csi-proxy.log.pos tag csi-proxy </source> # Example: # time="2019-12-10T21:27:59.836946700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 <source> @type tail format multiline multiline_flush_interval 5s format_firstline /^time=/ format1 /^time="(?<time>[^ ]*)" level=(?<severity>\w*) (?<message>.*)/ time_format %Y-%m-%dT%H:%M:%S.%N%z path /etc/kubernetes/logs/containerd.log pos_file /etc/kubernetes/logs/gcp-containerd.log.pos tag container-runtime </source> <match reform.**> @type record_reformer enable_ruby true <record> # Extract local_resource_id from tag for 'k8s_container' monitored # resource. The format is: # 'k8s_container.<namespace_name>.<pod_name>.<container_name>'. "logging.googleapis.com/local_resource_id" ${"k8s_container.#{tag_suffix[4].rpartition('.')[0].split('_')[1]}.#{tag_suffix[4].rpartition('.')[0].split('_')[0]}.#{tag_suffix[4].rpartition('.')[0].split('_')[2].rpartition('-')[0]}"} # Rename the field 'log' to a more generic field 'message'. This way the # fluent-plugin-google-cloud knows to flatten the field as textPayload # instead of jsonPayload after extracting 'time', 'severity' and # 'stream' from the record. message ${record['log']} # If 'severity' is not set, assume stderr is ERROR and stdout is INFO. severity ${record['severity'] || if record['stream'] == 'stderr' then 'ERROR' else 'INFO' end} </record> tag ${if record['stream'] == 'stderr' then 'raw.stderr' else 'raw.stdout' end} remove_keys stream,log </match> # TODO: detect exceptions and forward them as one log entry using the # detect_exceptions plugin # This section is exclusive for k8s_container logs. These logs come with # 'raw.stderr' or 'raw.stdout' tags. <match {raw.stderr,raw.stdout}> @type google_cloud # Try to detect JSON formatted log entries. detect_json true # Allow log entries from multiple containers to be sent in the same request. split_logs_by_tag false # Set the buffer type to file to improve the reliability and reduce the memory consumption buffer_type file buffer_path /var/log/fluentd-buffers/kubernetes.containers.buffer # Set queue_full action to block because we want to pause gracefully # in case of the off-the-limits load instead of throwing an exception buffer_queue_full_action block # Set the chunk limit conservatively to avoid exceeding the recommended # chunk size of 5MB per write request. buffer_chunk_limit 512k # Cap the combined memory usage of this buffer and the one below to # 512KiB/chunk * (6 + 2) chunks = 4 MiB buffer_queue_limit 6 # Never wait more than 5 seconds before flushing logs in the non-error case. flush_interval 5s # Never wait longer than 30 seconds between retries. max_retry_wait 30 # Disable the limit on the number of retries (retry forever). disable_retry_limit # Use multiple threads for processing. num_threads 2 use_grpc true # Skip timestamp adjustment as this is in a controlled environment with # known timestamp format. This helps with CPU usage. adjust_invalid_timestamps false </match> # Attach local_resource_id for 'k8s_node' monitored resource. <filter **> @type record_transformer enable_ruby true <record> "logging.googleapis.com/local_resource_id" ${"k8s_node.NODE_NAME"} </record> </filter> '@ # Downloads the out-of-tree kubelet image credential provider binaries. function DownloadAndInstall-AuthProviderGcpBinary { if ("${env:ENABLE_AUTH_PROVIDER_GCP}" -eq "true") { $filename = 'auth-provider-gcp.exe' if (ShouldWrite-File ${env:AUTH_PROVIDER_GCP_WINDOWS_BIN_DIR}\$filename) { Log-Output "Installing auth provider gcp binaries" $tmp_dir = 'C:\k8s_tmp' New-Item -Force -ItemType 'directory' $tmp_dir | Out-Null $url = "${env:AUTH_PROVIDER_GCP_STORAGE_PATH}/${env:AUTH_PROVIDER_GCP_VERSION}/windows_amd64/$filename" MustDownload-File -Hash $AUTH_PROVIDER_GCP_HASH_WINDOWS_AMD64 -Algorithm SHA512 -OutFile $tmp_dir\$filename -URLs $url Move-Item -Force $tmp_dir\$filename ${env:AUTH_PROVIDER_GCP_WINDOWS_BIN_DIR} Remove-Item -Force -Recurse $tmp_dir } else { Log-Output "Skipping auth provider gcp binaries installation, auth-provider-gcp.exe file already exists." } } } # Creates config file for the out-of-tree kubelet image credential provider. function Create-AuthProviderGcpConfig { if ("${env:ENABLE_AUTH_PROVIDER_GCP}" -eq "true") { if (ShouldWrite-File ${env:AUTH_PROVIDER_GCP_WINDOWS_CONF_FILE}) { Log-Output "Creating auth provider gcp config file" Set-Content ${env:AUTH_PROVIDER_GCP_WINDOWS_CONF_FILE} @' kind: CredentialProviderConfig apiVersion: kubelet.config.k8s.io/v1 providers: - name: auth-provider-gcp.exe apiVersion: credentialprovider.kubelet.k8s.io/v1 matchImages: - "container.cloud.google.com" - "gcr.io" - "*.gcr.io" - "*.pkg.dev" args: - get-credentials - --v=3 defaultCacheDuration: 1m '@ } else { Log-Output "Skipping auth provider gcp config file creation, it already exists" } } } # Export all public functions: Export-ModuleMember -Function *-*
combined_dataset/train/non-malicious/sample_65_76.ps1
sample_65_76.ps1
# # Module manifest for module 'OCI.PSModules.Secrets' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Secrets.dll' # Version number of this module. ModuleVersion = '85.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '9e5d79e8-8286-48b7-ab80-a55d8a9440d3' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Secrets Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Secrets.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCISecretsSecretBundle', 'Get-OCISecretsSecretBundleByName', 'Get-OCISecretsSecretBundleVersionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Secrets' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_4_75.ps1
sample_4_75.ps1
#************************************************ # DC_SystemCollect.ps1 # Version 1.1 # Date: 2009-2019 # Author: Walter Eder (waltere@microsoft.com) # Description: Collects additional System information and ETL Logs (tbd). # Called from: TS_AutoAddCommands_Apps.ps1 #******************************************************* Trap [Exception] { # Handle exception and throw it to the stdout log file. Then continue with function and script. $Script:ExceptionMessage = $_ "[info]: Exception occurred." | WriteTo-StdOut "[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut $Error.Clear() continue # later use return to return the exception message to an object: return $Script:ExceptionMessage } Write-verbose "$(Get-Date -UFormat "%R:%S") : Start of script DC_SystemCollect.ps1" "==================== Starting DC_SystemCollect.ps1 script ====================" | WriteTo-StdOut #_# Import-LocalizedData -BindingVariable ScriptStrings # Registry keys "Getting System Registry Keys" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_SystemFiles_Title -Status "Registry keys" $Regkeys = "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" $OutputFile = $ComputerName + "_reg_SystemPolicies_HKLM.txt" RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "System Policies Registry Key" -SectionDescription "Software Registry keys" $Regkeys = "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options", "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings" $OutputFile = $ComputerName + "_reg_ImageFileExecutionRegistry.txt" RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "ImageFileExecution Registry Key" -SectionDescription "Software Registry keys" $Regkeys = "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\MUI\UILanguages" $OutputFile = $ComputerName + "_reg_UILanguages_HKLM.txt" RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "UI Languages Registry Key" -SectionDescription "Software Registry keys" $Regkeys = "HKEY_LOCAL_MACHINE\SYSTEM\WPA" $OutputFile = $ComputerName + "_reg_WPA_HKLM.txt" RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "WPA Registry Key" -SectionDescription "Software Registry keys" $Regkeys = "HKCU\Software\Microsoft\Windows\CurrentVersion\DeviceAccess", "HKLM\Software\Microsoft\Windows\CurrentVersion\DeviceAccess" $OutputFile = $ComputerName + "_reg_DeviceAccess.txt" RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "Device Access Registry Key" -SectionDescription "Software Registry keys" $Regkeys = "HKCU\Software\Classes\ActivatableClasses", "HKLM\Software\Classes\ActivatableClasses" $OutputFile = $ComputerName + "_reg_ActivatableClasses.txt" RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "Activatable Classes Registry Key" -SectionDescription "Software Registry keys" $Regkeys = "HKCU\Software\Classes\Extensions" $OutputFile = $ComputerName + "_reg_Extensions_HKCU.txt" RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "Extensions Registry Key" -SectionDescription "Software Registry keys" # Licensing $Regkeys = "HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions" $OutputFile = $ComputerName + "_reg_ProductOptions_HKLM.txt" RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "Product Options Registry Key" -SectionDescription "Software Registry keys" $Regkeys = "HKLM\SYSTEM\CurrentControlSet\Control\FastCache" $OutputFile = $ComputerName + "_reg_FastCache_HKLM.txt" RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "FastCache Registry Key" -SectionDescription "Software Registry keys" # Windows RunTime Key $Regkeys = "HKLM\Software\Microsoft\WindowsRuntime" $OutputFile = $ComputerName + "_reg_WindowsRuntime_HKLM.txt" RegQuery -RegistryKeys $Regkeys -Recursive $true -OutputFile $OutputFile -fileDescription "WindowsRuntime Registry Key" -SectionDescription "Software Registry keys" # Saved Directories "Getting copies of System Files" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_SystemFiles_Title -Status $ScriptStrings.ID_SystemFiles_Status $sectionDescription = "System Files" if(test-path "$env:WinDir\Panther") { $DesinationTempFolder = Join-Path ($PWD.Path) ([System.Guid]::NewGuid().ToString()) Copy-Item "$env:WinDir\Panther" -Destination $DesinationTempFolder -Force -Recurse -ErrorAction SilentlyContinue CompressCollectFiles -filesToCollect $DesinationTempFolder -DestinationFileName "Panther.zip" -fileDescription "Windows\Panther files" -sectionDescription $sectionDescription -Recursive Remove-Item $DesinationTempFolder -Force -Recurse } if(test-path "$env:SystemDrive\ProgramData\Microsoft\Windows\WER") { $DesinationTempFolder = Join-Path ($PWD.Path) ([System.Guid]::NewGuid().ToString()) Copy-Item "$env:SystemDrive\ProgramData\Microsoft\Windows\WER" -Destination $DesinationTempFolder -Force -Recurse -ErrorAction SilentlyContinue CompressCollectFiles -filesToCollect $DesinationTempFolder -DestinationFileName "WER.zip" -fileDescription "Windows Error Reporting files" -sectionDescription $sectionDescription -Recursive Remove-Item $DesinationTempFolder -Force -Recurse } if(test-path "$env:WinDir\WinStore") { $DesinationTempFolder = Join-Path ($PWD.Path) ([System.Guid]::NewGuid().ToString()) Copy-Item "$env:WinDir\WinStore" -Destination $DesinationTempFolder -Force -Recurse -ErrorAction SilentlyContinue CompressCollectFiles -filesToCollect $DesinationTempFolder -DestinationFileName "WinStore.zip" -fileDescription "Windows\WinStore files" -sectionDescription $sectionDescription -Recursive Remove-Item $DesinationTempFolder -Force -Recurse } # Directory Listings "Getting Directory Listing of System Files" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_SystemFilesDirectoryListings_Title -Status $ScriptStrings.ID_SystemFilesDirectoryListings_Status $sectionDescription = "System Files Directory Listings" if(test-path "$env:windir\System32") { $OutputFile= $Computername + "_DirList_System32.txt" Get-ChildItem "$env:windir\System32" >> $OutputFile CollectFiles -filesToCollect $OutputFile -fileDescription "System32 Directory Listings" -sectionDescription $sectionDescription } if(test-path "$env:windir\SysWow64") { $OutputFile= $Computername + "_DirList_SystemWow64.txt" Get-ChildItem "$env:windir\SysWow64" >> $OutputFile CollectFiles -filesToCollect $OutputFile -fileDescription "SysWow64 Directory Listings" -sectionDescription $sectionDescription } $OutputFile= $Computername + "_DirList_UsageLogs.txt" Get-ChildItem "$env:LOCALAPPDATA\Packages\*\AC\Microsoft\CLR_v4.0_32\UsageLogs\*.log" >> $OutputFile CollectFiles -filesToCollect $OutputFile -fileDescription "Usage Logs Directory Listings" -sectionDescription $sectionDescription # Permission Data "Getting ACL Listing of System Files" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_SystemFilesACLListings_Title -Status $ScriptStrings.ID_SystemFilesACLListings_Status $sectionDescription = "System Files ACL Listings" $OutputFile= $Computername + "_ACLs_WinSxs.txt" Get-Acl "$env:windir\winsxs" | Format-List > $OutputFile CollectFiles -filesToCollect $OutputFile -fileDescription "WinSxs ACL Listings" -sectionDescription $sectionDescription $OutputFile= $Computername + "_ACLs_system32.txt" Get-Acl "$env:windir\System32" | Format-List > $OutputFile CollectFiles -filesToCollect $OutputFile -fileDescription "System32 ACL Listings" -sectionDescription $sectionDescription $OutputFile= $Computername + "_ACLs_SystemApps.txt" Get-Acl "$env:windir\SystemApps" | Format-List > $OutputFile CollectFiles -filesToCollect $OutputFile -fileDescription "SystemApps ACL Listings" -sectionDescription $sectionDescription $OutputFile= $Computername + "_ACLs_WindowsApps.txt" Get-Acl "$env:ProgramFiles\WindowsApps" | Format-List > $OutputFile CollectFiles -filesToCollect $OutputFile -fileDescription "WindowsApps ACL Listings" -sectionDescription $sectionDescription # May need additional Work on these two. $OutputFile= $Computername + "_ACLs.txt" Get-ACL 'HKLM:\', 'HKCU:\', 'hklm:\software\microsoft\ole', 'hklm:\system\currentcontrolset'| Format-List > $OutputFile CollectFiles -filesToCollect $OutputFile -fileDescription "ACLs" -sectionDescription $sectionDescription "Getting DCOM Permissions" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_DCOMPermissions_Title -Status $ScriptStrings.ID_DCOMPermissions_Status $sectionDescription = "DCOM Permissions" $OutputFile = $Computername + "_DCOMPerms.txt" $Reg = [WMIClass]"\\.\root\default:StdRegProv" $DCOMMachineLaunchRestriction = $Reg.GetBinaryValue(2147483650,"software\microsoft\ole","MachineLaunchRestriction").uValue $DCOMMachineAccessRestriction = $Reg.GetBinaryValue(2147483650,"software\microsoft\ole","MachineAccessRestriction").uValue $DCOMDefaultLaunchPermission = $Reg.GetBinaryValue(2147483650,"software\microsoft\ole","DefaultLaunchPermission").uValue $DCOMDefaultAccessPermission = $Reg.GetBinaryValue(2147483650,"software\microsoft\ole","DefaultAccessPermission").uValue $converter = new-object system.management.ManagementClass Win32_SecurityDescriptorHelper $CurrentDCOMSDDLMachineLaunchRestriction = $converter.BinarySDToSDDL($DCOMMachineLaunchRestriction) $CurrentDCOMSDDLMachineAccessRestriction = $converter.BinarySDToSDDL($DCOMMachineAccessRestriction) $CurrentDCOMSDDLDefaultLaunchPermission = $converter.BinarySDToSDDL($DCOMDefaultLaunchPermission) $CurrentDCOMSDDLDefaultAccessPermission = $converter.BinarySDToSDDL($DCOMDefaultAccessPermission) $CurrentDCOMSDDLMachineLaunchRestriction | Format-List | Out-File -FilePath $OutputFile -append $CurrentDCOMSDDLMachineAccessRestriction | Format-List | Out-File -FilePath $OutputFile -append $CurrentDCOMSDDLDefaultLaunchPermission | Format-List | Out-File -FilePath $OutputFile -append $CurrentDCOMSDDLDefaultAccessPermission | Format-List | Out-File -FilePath $OutputFile -append CollectFiles -filesToCollect $OutputFile -fileDescription "List of DCOM permissions" -sectionDescription $sectionDescription # Event Logs "Getting System Event Logs" | WriteTo-StdOut $sectionDescription = "Event Logs" $EventLogNames = "System", "Application" Run-DiagExpression .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -SectionDescription $sectionDescription $EventLogNames = "Microsoft-Windows-BitLocker\BitLocker Management", "Microsoft-Windows-BitLocker-DrivePreparationTool\Admin", "Microsoft-Windows-BitLocker-DrivePreparationTool\Operational" Run-DiagExpression .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -SectionDescription $sectionDescription $EventLogNames = "Microsoft-Windows-User Profile Service\Operational" Run-DiagExpression .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -SectionDescription $sectionDescription $EventLogNames = "Microsoft-Windows-Bits-Client/Operational" Run-DiagExpression .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -SectionDescription $sectionDescription $EventLogNames = "Microsoft-Windows-AppID/Operational" Run-DiagExpression .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -SectionDescription $sectionDescription # Env Vars "Getting Environment Variables" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_EnvironmentVariables_Title -Status $ScriptStrings.ID_EnvironmentVariables_Status $OutputFile = $ComputerName + "_EnvironmentVariables.txt" get-childitem env: |out-file $OutputFile $fileDescription = "Environment Variables" $sectionDescription = "Environment Variables" CollectFiles -filesToCollect $outfile -fileDescription $fileDescription -sectionDescription $sectionDescription # ipconfig "Getting IPConfig" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_IPConfig_Title -Status $ScriptStrings.ID_IPConfig_Status $OutputFile= $Computername + "_ipconfig.txt" $CommandToExecute = "ipconfig /all > $OutputFile" RunCmd -commandToRun $CommandToExecute -filesToCollect $OutputFile -fileDescription "IPConfig" -sectionDescription "IPConfig" # System Policies "Getting System Policies" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_SystemPolicies_Title -Status $ScriptStrings.ID_SystemPolicies_Status $OutputFile= $Computername + "_SystemPolicies.txt" $CommandToExecute = "GpResult /R > $OutputFile" RunCmd -commandToRun $CommandToExecute -filesToCollect $OutputFile -fileDescription "Gpresult /r output" -sectionDescription "System Policies" # Hosts file "Getting Hosts File" | WriteTo-StdOut $HostsFile = "$ENV:windir\system32\drivers\etc\hosts" if (test-path $HostsFile) { $OutputFile = $ComputerName + "_Dns_Hosts-file.txt" copy-item -Path $HostsFile -Destination $OutputFile -Force CollectFiles -filesToCollect $HostsFile -fileDescription "Hosts File" -sectionDescription "Hosts" } else { "$Hostsfile Does not exist" | writeto-stdout } # Proxy Settings "Getting Proxy Settings" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_ProxySettings_Title -Status $ScriptStrings.ID_ProxySettings_Status $OutputFile= $Computername + "_netsh_proxy_settings.txt" $CommandToExecute = "netsh winhttp show proxy >> $OutputFile" RunCmd -commandToRun $CommandToExecute -filesToCollect $OutputFile -fileDescription "Proxy Settings" -sectionDescription "Proxy Settings" # Get FireWall Service Status "Getting FireWall Service Status" | WriteTo-StdOut $MpsSvcStatus=(Get-Service -Name MpsSvc).Status If ($MpsSvcStatus -eq "Running") { "Status of FireWall Service is Running" | WriteTo-StdOut } else { "Status of FireWall Service is NOT Running" | WriteTo-StdOut } # Root Certificates Write-Host "$(Get-Date -UFormat "%R:%S") : Root Certificates" "Getting Root Certificates" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_RootCertificates_Title -Status $ScriptStrings.ID_RootCertificates_Status $OutputFile = $ComputerName + "_RootCerts.txt" get-childitem 'cert:\LocalMachine\root' | Format-List |Out-File $OutputFile CollectFiles -filesToCollect $OutputFile -fileDescription "List of Root Certificates" -sectionDescription "Root Certs" # Running Services "Getting Running Services" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_RunningServices_Title -Status $ScriptStrings.ID_RunningServices_Status $OutputFile = $ComputerName + "_RunningServices.txt" Get-Service | findstr /i 'running'|Out-File $Outputfile CollectFiles -filesToCollect $OutputFile -sectionDescription "Running Services" -fileDescription "Running Services" # Other logs "Getting Logs" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_OtherLogs_Title -Status $ScriptStrings.ID_OtherLogs_Status $sectionDescription = "CBS + Setupapi Logs" $OutputFile = $ComputerName + "_CBS.log" copy-item -Path "$env:windir\Logs\CBS\CBS.log" -Destination $OutputFile -Force CollectFiles -filesToCollect $OutputFile -fileDescription "CBS Log" -sectionDescription $sectionDescription $OutputFile = $ComputerName + "_setupapi.dev.log" copy-item -Path "$env:windir\inf\setupapi.dev.log" -Destination $OutputFile -Force CollectFiles -filesToCollect $OutputFile -fileDescription "Setupapi Log" -sectionDescription $sectionDescription # Video Display Info "Getting Video Display Logs" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_OtherLogs_Title -Status "Video Display Info" $OutputFile = $ComputerName + "_VideoDisplayInfo.txt" Get-CimInstance win32_displaycontrollerconfiguration |Out-File $Outputfile CollectFiles -sectionDescription "Display Info" -fileDescription "Display Info" -filesToCollect $OutputFile # Network Adapter Info "Getting Network Adapter Logs" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_OtherLogs_Title -Status "Network Adapter Info" $OutputFile = $ComputerName + "_NetworkAdapterInfo.txt" Get-CimInstance Win32_NetworkAdapterConfiguration | out-file $Outputfile CollectFiles -filesToCollect $Outputfile -fileDescription "Network Adapter Info" -sectionDescription "Network Adapter Info" # OS Version Info "Getting OS Version Info" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_OtherLogs_Title -Status "OS Version Info" $OutputFile = $ComputerName + "_WindowsVersionInfo.txt" Get-CimInstance Win32_OperatingSystem |Out-File $Outputfile CollectFiles -sectionDescription "OS Version Info" -fileDescription "OS Version Info" -filesToCollect $OutputFile # Collect ETL Logs Write-Host "$(Get-Date -UFormat "%R:%S") : Collect ETL Logs (tbd)" "Getting ETL Logs" | WriteTo-StdOut Write-DiagProgress -Activity $ScriptStrings.ID_ETLLogs_Title -Status $ScriptStrings.ID_ETLLogs_Status if ($Global:runFull -eq $True) { # $False = disabling for now for this long-lasting step if(Test-Path "$env:localappdata\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState") { $DesinationTempFolder = Join-Path ($PWD.Path) ([System.Guid]::NewGuid().ToString()) Copy-Item "$env:localappdata\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\LocalState" -Destination $DesinationTempFolder -Force -Recurse -ErrorAction SilentlyContinue CompressCollectFiles -filesToCollect $DesinationTempFolder -DestinationFileName "LiveComm.zip" -fileDescription "Windows Live applications ETL" -sectionDescription "ETL Logs" -Recursive Remove-Item $DesinationTempFolder -Force -Recurse } } Write-verbose "$(Get-Date -UFormat "%R:%S") : end of script DC_SystemCollect.ps1" # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDZkk5d7o2b1qYM # GjiNJe8Re8cU3Bi/60sDPkyUrm049qCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMQOGetVecGdsWoXHkoVVzUE # c5KalL9+yO2uLhtNa7L/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEADueZZRoPCtUliyFVWAWMD476dYg9I4KFmOl/NJa0SXh19Mwv0oG5dV9N # OxZV1DPfJA8RHxtEynmFy9elrELshz8cCHuvxYbTi9VoQnTGLMlHrs/e7ovoNy4e # ZLSP5xf28Zn77G9oiQn3WPs6gWQPhDNU4bCdw3c1F4GJhDg0qXqHrtnco7Kwqnk7 # WxkrrofA2ymqSJUPIc5pbEOKhDXimLpyKMS/ZA++K+9DTAgP6x5M4P2sBo6wsrtP # qr/CBnHRG7kc+RdMpgzQAGqBkuX5tuyzCGLwxw6MjIp+SJ9q0orxbjt0mjeblUA0 # FU0BQY81wWISgeYsGsoHL9AhG0FHw6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDBl+9i5WOoKznA5uSu/uhwU5EN+38YnLY+IRh5sJ2oUgIGZut4BYy/ # GBMyMDI0MTAyODExNDA0My45MDFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9ZkJlLzxxlCMAAEAAAH1MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwMVoXDTI1MTAyMjE4MzEwMVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjY1MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzO90cFQTWd/WP84IT7JM # IW1fQL61sdfgmhlfT0nvYEb2kvkNF073ZwjveuSWot387LjE0TCiG93e6I0HzIFQ # BnbxGP/WPBUirFq7WE5RAsuhNfYUL+PIb9jJq3CwWxICfw5t/pTyIOHjKvo1lQOT # WZypir/psZwEE7y2uWAPbZJTFrKen5R73x2Hbxy4eW1DcmXjym2wFWv10sBH40aj # Jfe+OkwcTdoYrY3KkpN/RQSjeycK0bhjo0CGYIYa+ZMAao0SNR/R1J1Y6sLkiCJO # 3aQrbS1Sz7l+/qJgy8fyEZMND5Ms7C0sEaOvoBHiWSpTM4vc0xDLCmc6PGv03CtW # u2KiyqrL8BAB1EYyOShI3IT79arDIDrL+de91FfjmSbBY5j+HvS0l3dXkjP3Hon8 # b74lWwikF0rzErF0n3khVAusx7Sm1oGG+06hz9XAy3Wou+T6Se6oa5LDiQgPTfWR # /j9FNk8Ju06oSfTh6c03V0ulla0Iwy+HzUl+WmYxFLU0PiaXsmgudNwVqn51zr+B # i3XPJ85wWuy6GGT7nBDmXNzTNkzK98DBQjTOabQXUZ884Yb9DFNcigmeVTYkyUXZ # 6hscd8Nyq45A3D3bk+nXnsogK1Z7zZj6XbGft7xgOYvveU6p0+frthbF7MXv+i5q # cD9HfFmOq4VYHevVesYb6P0CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRV4Hxb9Uo0 # oHDwJZJe22ixe2B1ATAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAcwxmVPaA9xHf # fuom0TOSp2hspuf1G0cHW/KXHAuhnpW8/Svlq5j9aKI/8/G6fGIQMr0zlpau8jy8 # 3I4zclGdJjl5S02SxDlUKawtWvgf7ida06PgjeQM1eX4Lut4bbPfT0FEp77G76hh # ysXxTJNHv5y+fwThUeiiclihZwqcZMpa46m+oV6igTU6I0EnneotMqFs0Q3zHgVV # r4WXjnG2Bcnkip42edyg/9iXczqTBrEkvTz0UlltpFGaQnLzq+No8VEgq0UG7W1E # LZGhmmxFmHABwTT6sPJFV68DfLoC0iB9Qbb9VZ8mvbTV5JtISBklTuVAlEkzXi9L # IjNmx+kndBfKP8dxG/xbRXptQDQDaCsS6ogLkwLgH6zSs+ul9WmzI0F8zImbhnZh # UziIHheFo4H+ZoojPYcgTK6/3bkSbOabmQFf95B8B6e5WqXbS5s9OdMdUlW1gTI1 # r5u+WAwH2KG7dxneoTbf/jYl3TUtP7AHpyck2c0nun/Q0Cycpa9QUH/Dy01k6tQo # mNXGjivg2/BGcgZJ0Hw8C6KVelEJ31xLoE21m9+NEgSKCRoFE1Lkma31SyIaynbd # YEb8sOlZynMdm8yPldDwuF54vJiEArjrcDNXe6BobZUiTWSKvv1DJadR1SUCO/Od # 21GgU+hZqu+dKgjKAYdeTIvi9R2rtLYwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAJsAKu48NbR5YRg3WSBQCyjzdkvaggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJXmQwIhgPMjAyNDEwMjgwMDUwNDRaGA8yMDI0MTAyOTAwNTA0NFowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6sleZAIBADAHAgEAAgIUjDAHAgEAAgIUCjAK # AgUA6sqv5AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCjXPh2fTsMuBQC # 04YmahPTF/w7d8iDvw/A+ry0UWRA9ksIf/WmY8UAK7V3UQpZXoPQDP+vfvum15Jd # ooo9/XlK2HcGWEXCT8FTfU2Fjw1K1M6VrZrX8XlmM6gSTwUk7hZ060ozBQBEDelh # GRatBQ4s+l2RX1TMP56yQoM4DWc4qYSVU89ILVamoXe3FyMaE9PqRohkoHLhl8vm # IdOLSQqg1yhRQl59tcVM66AXscswX4jNeFoltuC9T9KORL3KvFgrx7XzEQvr2WlE # waAi4c4KUdNGhyXkTV9PUnWRmmVDcbMll8tm5RCJWZIBNChydfZETThcPXRdrz53 # AeXHysfYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH1mQmUvPHGUIwAAQAAAfUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgnrjl+1ZOnwxh # ejJw+95di5RjupYRHQKN3EnIIp7DtuUwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCDB1vLSFwh09ISu4kdEv4/tg9eR1Yk8w5x7j5GThqaPNTCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9ZkJlLzxxlCMAAEAAAH1 # MCIEIKr5EH41eNtzA7HjeQBOfZB/TsSU/rMhC8quH1u1KYILMA0GCSqGSIb3DQEB # CwUABIICALLPMI9TRXOTlOdaN3NZz20eI1Z83a+q1FFk5J/eRkv4a+Fl7djn58d1 # s6vGbDcV4uTqHWTxxwtHe0Xjf8fymAMtZhoQnWqw+O5QaOaaqtnGw2ecm8h9HEgP # 2e1SzK6Uocn7WGh17DLGZIMAuucanTfzdxSGTqzT/lKxc5ysfUt1LsyMtUcafFS8 # rs5zuPnfq2xpu9P/3LDugl56bAmN52lz3GTbmapUTqFGlyXJjPO5aDlP65vJSu78 # nzVbB/gWUd5SdyJbxVSmii4JtqAodnF5B2GKqdaqgpqCGQvcW3r6g1jWawonk7lU # 5YDHRxPftF+LwX0m0Z9dbs/9feJrQT2GUK2hIzImGjC6Rt+7zClUFi0u+ErAy5Se # Ksy5MO7T9aRCrrjz3n4sviQJaUwbl5rNRNnx7ANeNoSRM3XjmV6dfnlBCa6l8hEz # SndFynGA/WP2w9rw+QRAiActHSEGYJ0QOCfuPwBfnld7iHtRStVJOgcggQDT2/IM # PBPqMFw3+Pwu9fxJXhAn03C2JwmXg5SG39DHMt/nnE9t2rbcqe4Wk4XGhzI+rOpS # yOJYi4+8Cze8VosEVe4SD+G+qfWW5Q1CeJkm2Ls+mxVKjsQ1AyCACGAK4JyvfjuJ # uQE0OThT79iZ98kHPqyHmhLAaoNjN8ZpNOJIFntL3V27qjhJSxS4 # SIG # End signature block
combined_dataset/train/non-malicious/sample_61_84.ps1
sample_61_84.ps1
@{ GUID="56D66100-99A0-4FFC-A12D-EEE9A6718AEF" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Start-Transcript", "Stop-Transcript" AliasesToExport = @() NestedModules="Microsoft.PowerShell.ConsoleHost.dll" HelpInfoURI = 'https://aka.ms/powershell73-help' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAafI9Gy/Jba/h5 # P4E+2b0zPlBjhQyHNjAYnPqkeCyjq6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILL0LNcTOl5fB4j3BOCsjqQo # x/Jicg70oB7mLdT2Lf6QMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAbnRzo0A3sSZ/GIP3Z3xJ5C+BLn5jLp0jAWV4PuiDE+yc2EbDZNJQIT9z # EvKZ458xy/tbRaZDNuBIKENgYHct+9dPb4z99rCBy0dhjtByBqc8FzGDtl20K7D+ # Gmol5XbgD8vAgRlZCbnwCOBHnyNaXhISQgdCz81gQ2re2NZr67SY5J7PsJ0u6/FT # rbpnT9jGDmpUAtS1mGexnlXYX2D1TWDz+54LJruwqET291w6DaxAgXzS1MP6lD9i # vA5+FvdPm9KVJj9QVGI3YP2hWG7w+0mbup5UQFkTct1q2H+VwMtoDrGy2oog8I0n # lgp75aG3HDnyYNE5Vcuu1S1Uos4P9aGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDaE5ukTalehAPfxlyt9eVrZ4EspeNPqtP/yMw8/qNbOQIGZlddpybd # GBMyMDI0MDYxMzAxMTkyNC4wMDVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOoUT80wIhgPMjAyNDA2MTMwMDQ4MTNaGA8yMDI0MDYxNDAwNDgxM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6hRPzQIBADAHAgEAAgIDxTAHAgEAAgITQTAKAgUA # 6hWhTQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAIhI1mgXH10uv2l9GzMQ # OLg+7GWGDmVwOXPpQPD54KKIj7gNfvMz7zgUFwoZkHwwvuRjyvCSTx/0VQXPJHWQ # k6ojHfin1eNNu9n5Fk0no9MMRc/4jtmZohJtDY44yyJ1hvsJoOTopdgxAbCVMSrs # xlExm89ChUm9bmjZi1XgnQ2qMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgbfyfToRLwZezXrG384maKBRGFvdCAjqJ0jy789SEtOQwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN # NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg # jMJfWF6OAAEAAAHcMCIEILx5R9MK3zyYbzuTcDmU0TTvF3fgg9/5CXdl+AeUFU6a # MA0GCSqGSIb3DQEBCwUABIICAB5ZjRvWel2odpu3T6UUI1SM/piinYf9x9TwVASw # IPwApyrL3sftw/X1VkHnCqXloWCqS0rauy7ViHyOUoyLpB3i7ASzqLl7RA4zQLUi # 9B1n3VC9EY+Pb+4GJVTBk8SF1t4XzH8GZPw6D6QEMCtp3Mj+p4TrZRsnn8EKXnXB # bs5hoqUh/Lxuv3GFKlMClnTrgMgL0YvyQKGTX6TNedDtFkQLZdigEbaxJUy4Igby # aFCKN+//VxJ+gxGM8I300lM91ZGUwaJIULxXyNWO2ub/XLqv+2ykygRe6GbA4EsD # ldpLSjfBtSn1Y2C9DzoJWSJdtT64rGjvR/M1YoPOsdNjzRdzBScOvyX/b2pv1BjH # 4DrTl2ycDUztPp/nRsLm8DvnzfYVP3aQ1UIcJbCqme7aKZBMiWCFZ7o1BlbNtS/G # VBKyZ38zuR/fjKI8OIiuydEGOyDSdlgSv/WM684bXH9G399kYAXM3m/7gdfAUDcA # gLlQcGVD1+/UmHVeOUU2+39ztrZDQdQng1IPwpaQ9YL5Jp6zzPP5zC5LOcDVytbS # 9Vo+jtloPkgmby8xzGle5Acu0Dr1uvd44Yj0mgAyT6bvSu7YyOBvNq0iJR0Qah/u # XSsRCQ1AprNEx3ShbthpKXF1C55TTKwcPspprn+lmquBWA7LHZdVXOPY+Nw6sTwP # DnlH # SIG # End signature block
combined_dataset/train/non-malicious/Replicate-ADDS.ps1
Replicate-ADDS.ps1
# Transcribe output to log $null = Start-Transcript "$pwd\\$([System.IO.Path]::GetFileNameWithoutExtension($MyInvocation.MyCommand.Definition)).log" # Check the QAD snapins are installed if ( (Get-PSSnapin -Name Quest.ActiveRoles.ADManagement -ErrorAction silentlycontinue) -eq $null ) { # The QAD snapin is not active. Check it's installed if ( (Get-PSSnapin -Name Quest.ActiveRoles.ADManagement -Registered -ErrorAction SilentlyContinue) -eq $null) { Write-Error "You must install Quest ActiveRoles AD Tools to use this script!" } else { Write-Host "Importing QAD Tools" Add-PSSnapin -Name Quest.ActiveRoles.ADManagement -ErrorAction Stop } } Write-Host "Beginning ADDS Replication" Write-Host "==========================" Get-QADComputer -ComputerRole 'DomainController' | % { Write-Host "Replicating $($_.Name)" $null = repadmin /kcc $_.Name $null = repadmin /syncall /A /e $_.Name } Write-Host "==========================" Write-Host "Completed ADDS Replication" Stop-Transcript
combined_dataset/train/non-malicious/sample_27_2.ps1
sample_27_2.ps1
<################################################### # # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> # Import Observability EventSource $observabilityNugetPath = "$PSScriptRoot\..\.." Add-Type -Path "$observabilityNugetPath\lib\net472\Microsoft.AzureStack.Observability.ObservabilityDeployment.dll" # Uptime scheduled task with retires. function Set-UptimeTaskWithRetry { $retryAttempt = 0 $retrySleepTimeInSeconds = 10 $Retries = 5 $success = $false while(-not($success) -and ($retryAttempt -lt $Retries)) { $retryAttempt = $retryAttempt + 1 try { Write-InfoLog "Trying to setup VM uptime scheduled task. Attempt $retryAttempt of $Retries" Set-UptimeTask $success = $true } catch { if ($retryAttempt -lt $Retries) { $exceptionMessage = $_.Exception.Message Write-ErrorLog "Failure during VM uptime scheduled task setup: '$exceptionMessage'. Retrying." } else { # All retries failed. return $_ } Start-Sleep -Seconds $retrySleepTimeInSeconds } } return $true } # Create VM uptime scheduled task. function Set-UptimeTask { $observabilityNugetPath = "$PSScriptRoot\..\.." $uptimeObservabilityPath = "$observabilityNugetPath\content\Powershell\ObservabilityUptime.ps1" # Create Scheduled task to get VM uptime from time series database. $taskName = "ObservabilityUptime" if(Test-ScheduledTaskExists -TaskName $taskName) { Unregister-ScheduledTask -TaskName $taskName -Confirm:$false | Out-Null } Write-InfoLog "Creating new scheduled task $taskName." $frequency = New-TimeSpan -Hours 1 $principal = New-ScheduledTaskPrincipal -UserId "SYSTEM" -LogonType ServiceAccount $trigger = New-ScheduledTaskTrigger -Once -RepetitionInterval $frequency -At (Get-Date).AddMinutes(10) -RepetitionDuration (([DateTime]::Now).AddYears(10) - [DateTime]::Now) $action = New-ScheduledTaskAction ` -Execute "powershell.exe" ` -Argument "-Command $uptimeObservabilityPath" $settings = New-ScheduledTaskSettingsSet $task = New-ScheduledTask -Action $action -Trigger $trigger -Settings $settings -Principal $principal Register-ScheduledTask -TaskName $taskName -TaskPath "Microsoft\AzureStack\Observability" -InputObject $task Write-InfoLog "Creating new scheduled task $taskName succeeded." } # Returns true if a given task exists and false otherwise. function Test-ScheduledTaskExists { param( [string] [Parameter(Mandatory=$true)] $TaskName ) try { if(Get-ScheduledTask -TaskName $TaskName -ErrorAction Stop) { return $true } } catch {} return $false } # Write uptime event. function Write-UptimeEvent { param( [string] [Parameter(Mandatory=$true)] $VmName, [string] [Parameter(Mandatory=$true)] $NodeName, [string] [Parameter(Mandatory=$true)] $VmUptime, [string] [Parameter(Mandatory=$true)] $Iops, [string] [Parameter(Mandatory=$true)] $Memory, [string] [Parameter(Mandatory=$true)] $Throughput, [string] [Parameter(Mandatory=$true)] $Cpu, [string] [Parameter(Mandatory=$true)] $VmId ) Write-InfoLog "Writing uptime event for VM: $VmName" [Microsoft.AzureStack.Observability.ClusterPerfEventSource]::Instance.WriteUptimeEvent($VmName, $NodeName, $VmUptime, $Iops, $Memory, $Throughput, $Cpu, $VmId) } # Write cluster perf data event. function Write-ClusterPerfDataEvent { param( [string] [Parameter(Mandatory=$true)] $NodeName, [string] [Parameter(Mandatory=$true)] $ClusterPerfData ) Write-InfoLog "Writing cluster perf data event for node: $NodeName" [Microsoft.AzureStack.Observability.ClusterPerfEventSource]::Instance.WriteClusterPerfDataEvent($NodeName, $ClusterPerfData) } # Write info log event. function Write-InfoLog { param( [string] [Parameter(Mandatory=$true)] $Message ) [Microsoft.AzureStack.Observability.ClusterPerfEventSource]::Instance.WriteInformational($Message) } # Write error log event. function Write-ErrorLog { param( [string] [Parameter(Mandatory=$true)] $Message ) [Microsoft.AzureStack.Observability.ClusterPerfEventSource]::Instance.WriteError($Message) } Export-ModuleMember -Function Set-UptimeTaskWithRetry Export-ModuleMember -Function Write-ClusterPerfDataEvent Export-ModuleMember -Function Write-ErrorLog Export-ModuleMember -Function Write-InfoLog Export-ModuleMember -Function Write-UptimeEvent # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCgG+hvVsMBhPMG # uH234dV2L9nroLPUbz87wv0HVK8NuKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINtK294pvwtCBezjg8gO/fDS # vcrvlTKSC1TZaxw2R9SvMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAd8l7IiQBl/Yxk9SxtqFPjj7ukv2fW4YNgQE6VOLnZQA0ZkOf8UEMAxu7 # ZphrhPcY/7X3KV+MBNVkN6laKoryoIzj0ayesAa6QKXFtJAU8UwAmm38gqTI4Mkl # dKQImbGAFwdc/n5oqlySrQDfQpf6Ib+rbbtl9bUzfAAd8fCObpVazv3+s/0SHld9 # J9AGLs+0aRnG7sYsv/y/ZuvgAeaKZLeo8CqxWTdr2IhIKBrzDcOl1rIK6PegocVv # yXn9NcMjzmysQkgRey3/lDiV/j+p4QDI15RJqG+Ks1Ifgz74b6M9w8pKGyBISWTd # YnbiBtugwdmcpes6juutt5ufND+Cf6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBVcThcC+1pfywa0U03uqQTt3kd8QQwygFButuh9IV+cgIGZbwS4CKV # GBMyMDI0MDIxMjE0MDkyNS43NjRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAebZQp7qAPh94QABAAAB5jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MTVaFw0yNTAzMDUxODQ1MTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC9vph84tgluEzm/wpNKlAjcElGzflvKADZ1D+2d/ie # YYEtF2HKMrKGFDOLpLWWG5DEyiKblYKrE2nt540OGu35Zx0gXJBE0zWanZEAjCjt # 4eGBi+uakZsk70zHTQHHyfP+B3m2BSSNFPhgsVIPp6vo/9t6OeNezIwX5E5+VwEG # 37nZgEexQF2fQZYbxQ1AauqDvRdXsSpK1dh1UBt9EaMszuucaR5nMwQN6sDjG99F # zdK9Atzbn4SmlsoLUtRAh/768sKd0Y1hMmKVHwIX8/4JuURUBRZ0JWu0NYQBp8kh # ku18Q8CAQ500tFB7VH3pD8zoA4lcA7JkxTGoPKrufm+lRZAA4iMgbcLZ2P/xSdnK # FxU8vL31RoNlZJiGL5MqTXvvyBLz+MRP4En9Nye1N8x/lJD1stdNo5wJG+mgXsE/ # zfzg2GaVqQczFHg0Nl8bpIqnNFUReQRq3C1jVYMCScegNzHeYtw5OmZ/7eVnRmjX # lCsLvdsxOzc1YVn6nZLkQD5y31HYrB9iIHuswhaMv2hJNNjVndkpWy934PIZuWTM # k360kjXPFwl2Wv1Tzm9tOrCq8+l408KIL6J+efoGNkR8YB3M+u1tYeVDO/TcObGH # xaGFB6QZxAUpnfB5N/MmBNxMOqzG1N8QiwW8gtjjMJiFBf6iYYrCjtRwF7IPdQLF # tQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOUEMXntN54+11ZM+Qu7Q5rg3Fc9MB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBhbuogTapRsuwSkaFMQ6dyu8ZCYUpWQ8iI # rbi40tU2hK6pHgu0hj0z/9zFRRx5DfhukjvbjA/dS5VYfxz1EIbPlt897MJ2sBGO # 2YLYwYelfJpDwbB0XS9Zkrqpzq6X/lmDQDn3G5vcYpYQCJ55LLvyFlJ195AVo4Wy # 8UX5p7g9W3MgNHQMpM+EV64+cszj4Ho5aQmeKGtKy7w72eRY/vWDuptrvzruFNmK # CIt12UcA5BOsXp1Ptkjx2yRsCj77DSml0zVYjqW/ISWkrGjyeVJ+khzctxaLkklV # wCxigokD6fkWby0hCEKTOTPMzhugPIAcxcHsR2sx01YRa9pH2zvddsuBEfSFG6Cj # 0QSvEZ/M9mJ+h4miaQSR7AEbVGDbyRKkYn80S+3AmRlh3ZOe+BFqJ57OXdeIDSHb # vHzJ7oTqG896l3eUhPsZg69fNgxTxlvRNmRE/+61Yj7Z1uB0XYQP60rsMLdTlVYE # yZUl5MLTL5LvqFozZlS2Xoji4BEP6ddVTzmHJ4odOZMWTTeQ0IwnWG98vWv/roPe # gCr1G61FVrdXLE3AXIft4ZN4ZkDTnoAhPw7DZNPRlSW4TbVj/Lw0XvnLYNwMUA9o # uY/wx9teTaJ8vTkbgYyaOYKFz6rNRXZ4af6e3IXwMCffCaspKUXC72YMu5W8L/zy # TxsNUEgBbTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDi # WNBeFJ9jvaErN64D1G86eL0mu6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRomTAiGA8yMDI0MDIxMjA5NTEy # MVoYDzIwMjQwMjEzMDk1MTIxWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGiZ # AgEAMAoCAQACAin7AgH/MAcCAQACAhKaMAoCBQDpdboZAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBADNNVSiuJ5SM8KG+3Uaixe7q912yiSwlJSYtWLVyLLHo # Fx26UYugAKiKq9UCpoBNA6XB1NV2kvvGvG9LSMOwvf5hp5+sKYKL7lJ20C7YVzXf # ygZ4L18IvijXc7fu665TKEQFpeS7e2dgUknDxqxd5fJwMeEeIRWCCroYWGbpI2Xz # rib6CtaHbOjdb3lf323rXRi2P7EMNkU2SUzj22fkul5hQCyyc94GyJxSAiAFg7Y6 # +jYKqGNxX824e4l62Vguv878TxW5ag11msCnmq7UMA3ne+QUrH2FJ+mRLiTLCkhM # 7avLMo5F8CImUpWjJzbDiPEXnF5sPH73RVUJwX8tmYQxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZQp7qAPh94QABAAAB # 5jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDlP6/ltWF4MflT1ELd3UkZ7zUbuG9s1oobv7cCeeSs # SzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM+7o4aoHrMJaG8gnLO1q16h # IYcRnoy6FnOCbnSD0sZZMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHm2UKe6gD4feEAAQAAAeYwIgQgOi5GMi3069gE+yhbRRSSY5cZ # oiPrWAf5OfAW14VglJ4wDQYJKoZIhvcNAQELBQAEggIANPwVoPvivcnDv4ySoDgY # R6vf5T9HQ2buZKYFq3ZvB9imtWOc9pQbO0155LXuEC11ui4NA6qbPE0M80gUm+i1 # xNXc+PA83uoHBFJ6sMevDGgmojxIsbxu+I8YJ4kcrysFiFLiVUG5nN9jZM9tBzRH # Rx+fxTiQWi130c0K/g9ZK/N4N9wB4QiNPSiV4xkviJHyLeZtHilLyIRb9t1XxP0H # 5QhW7hkeORHu2yg7r2pDsoY3baQvRTaRPdJgKky+zhJHttvgdh2E/Y7vERwdbJLy # daIkuU4KdBKeIAN5eC+R0mp3TS8qZALKR/IvfZk2usK2dgEgdJU7p8HE6S7NBUqA # UCrKgRDJsOdUYbzTbu9UWYuLpo2FBxVMJwiU5UlbuFJbWmztuHvyDeX/WmOIS3yA # ycRCwaNA/HBHx8epPga0rnoKwpU9TdKLvmWDUjWJGiWQs9FfQV70WZM3mwSiMVBg # KgfYjIUdDcREcaia00oFvc6rvMSO9lFGRSf5fQEfStbbfzrsMGRTrFz5QnhW7Ddu # svCTYC+SD815kNeJGmQMZgPgWR1fedfX+Y9NmUa7x/1yDSrOqcqfdcf1fLFU3gXF # HxOdkpLyIdPr1tzxiMsLfo9WcABHzFqyMugAMRiU+BMXW1F0O1/eQcXwgyRu2SWu # sk5joPhadIrgUqNo07IKLvY= # SIG # End signature block
combined_dataset/train/non-malicious/sample_44_83.ps1
sample_44_83.ps1
# # Module manifest for module 'OCI.PSModules.Announcementsservice' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Announcementsservice.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '4260cf9c-0dfb-4f1c-ac46-7d08fcbebbf2' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Announcementsservice Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Announcementsservice.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAnnouncementsserviceAnnouncement', 'Get-OCIAnnouncementsserviceAnnouncementsList', 'Get-OCIAnnouncementsserviceAnnouncementsPreference', 'Get-OCIAnnouncementsserviceAnnouncementsPreferencesList', 'Get-OCIAnnouncementsserviceAnnouncementSubscription', 'Get-OCIAnnouncementsserviceAnnouncementSubscriptionsList', 'Get-OCIAnnouncementsserviceAnnouncementUserStatus', 'Move-OCIAnnouncementsserviceAnnouncementSubscriptionCompartment', 'New-OCIAnnouncementsserviceAnnouncementsPreference', 'New-OCIAnnouncementsserviceAnnouncementSubscription', 'New-OCIAnnouncementsserviceFilterGroup', 'Remove-OCIAnnouncementsserviceAnnouncementSubscription', 'Remove-OCIAnnouncementsserviceFilterGroup', 'Update-OCIAnnouncementsserviceAnnouncementsPreference', 'Update-OCIAnnouncementsserviceAnnouncementSubscription', 'Update-OCIAnnouncementsserviceAnnouncementUserStatus', 'Update-OCIAnnouncementsserviceFilterGroup' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Announcementsservice' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_25_25.ps1
sample_25_25.ps1
# # Module manifest for module 'OCI.PSModules.Filestorage' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Filestorage.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '85a998bb-f613-464a-af19-f5aaed2d127b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Filestorage Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Filestorage.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIFilestorageKeyTabs', 'Get-OCIFilestorageExport', 'Get-OCIFilestorageExportSet', 'Get-OCIFilestorageExportSetsList', 'Get-OCIFilestorageExportsList', 'Get-OCIFilestorageFileSystem', 'Get-OCIFilestorageFileSystemsList', 'Get-OCIFilestorageFilesystemSnapshotPoliciesList', 'Get-OCIFilestorageFilesystemSnapshotPolicy', 'Get-OCIFilestorageMountTarget', 'Get-OCIFilestorageMountTargetsList', 'Get-OCIFilestorageOutboundConnector', 'Get-OCIFilestorageOutboundConnectorsList', 'Get-OCIFilestorageReplication', 'Get-OCIFilestorageReplicationsList', 'Get-OCIFilestorageReplicationTarget', 'Get-OCIFilestorageReplicationTargetsList', 'Get-OCIFilestorageSnapshot', 'Get-OCIFilestorageSnapshotsList', 'Invoke-OCIFilestorageEstimateReplication', 'Invoke-OCIFilestoragePauseFilesystemSnapshotPolicy', 'Invoke-OCIFilestorageUnpauseFilesystemSnapshotPolicy', 'Move-OCIFilestorageFileSystemCompartment', 'Move-OCIFilestorageFilesystemSnapshotPolicyCompartment', 'Move-OCIFilestorageMountTargetCompartment', 'Move-OCIFilestorageOutboundConnectorCompartment', 'Move-OCIFilestorageReplicationCompartment', 'New-OCIFilestorageExport', 'New-OCIFilestorageFileSystem', 'New-OCIFilestorageFilesystemSnapshotPolicy', 'New-OCIFilestorageMountTarget', 'New-OCIFilestorageOutboundConnector', 'New-OCIFilestorageReplication', 'New-OCIFilestorageSnapshot', 'Remove-OCIFilestorageExport', 'Remove-OCIFilestorageFileSystem', 'Remove-OCIFilestorageFilesystemSnapshotPolicy', 'Remove-OCIFilestorageMountTarget', 'Remove-OCIFilestorageOutboundConnector', 'Remove-OCIFilestorageReplication', 'Remove-OCIFilestorageReplicationTarget', 'Remove-OCIFilestorageSnapshot', 'Update-OCIFilestorageExport', 'Update-OCIFilestorageExportSet', 'Update-OCIFilestorageFileSystem', 'Update-OCIFilestorageFilesystemSnapshotPolicy', 'Update-OCIFilestorageMountTarget', 'Update-OCIFilestorageOutboundConnector', 'Update-OCIFilestorageReplication', 'Update-OCIFilestorageSnapshot' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Filestorage' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Findup_28.ps1
Findup_28.ps1
using System; using System.Collections; using System.Collections.Generic; using System.Text; using System.Security.Cryptography; using System.Runtime.InteropServices; using Microsoft.Win32; using System.IO; using System.Text.RegularExpressions; namespace Findup { public class FileLengthComparer : IComparer<FileInfo> { public int Compare(FileInfo x, FileInfo y) { return (x.Length.CompareTo(y.Length)); } } class Findup { public static Dictionary<string, List<string>> optionspaths = new Dictionary<string, List<string>> { {"/x", new List<string>()},{"/i",new List<string>()},{"/xf",new List<string>()},{"/if",new List<string>()}, {"/xd",new List<string>()},{"/id",new List<string>()},{"/paths",new List<string>()} }; public static Dictionary<string, List<Regex>> optionsregex = new Dictionary<string, List<Regex>> { {"/xr", new List<Regex>()},{"/ir",new List<Regex>()},{"/xfr",new List<Regex>()},{"/ifr",new List<Regex>()}, {"/xdr",new List<Regex>()},{"/idr",new List<Regex>()} }; public static Dictionary<string, Boolean> optionsbools = new Dictionary<string, bool> { { "/recurse", false }, { "/noerr", false }, {"/delete",false}, {"/xj", false}}; public static long numOfDupes, dupeBytes, bytesrecovered, deletedfiles = 0; // number of duplicate files found, bytes in duplicates, bytes recovered from deleting dupes, number of deleted dupes. public static long errors = 0; public static string delconfirm; public static void Main(string[] args) { DateTime startTime = DateTime.Now; Console.WriteLine("Findup.exe v2.0 - By James Gentile - JamesRaymondGentile@gmail.com - 2012."); Console.WriteLine("Findup.exe matches sizes, then SHA512 hashes to identify duplicate files."); Console.WriteLine(" "); string optionskey = "/paths"; List<FileInfo> files = new List<FileInfo>(); int i = 0; for (i = 0; i < args.Length; i++) { string argitem = args[i].ToLower(); if ((System.String.Compare(argitem, "/help", true) == 0) || (System.String.Compare(argitem, "/h", true) == 0)) { Console.WriteLine("Usage: findup.exe <file/directory #1..#N> [/recurse] [/noerr] [/x /i /xd /id /xf /if + [r]] <files/directories/regex> [/delete]"); Console.WriteLine(" "); Console.WriteLine("Options: /help - displays this help message."); Console.WriteLine(" /recurse - recurses through subdirectories when directories or file specifications (e.g. *.txt) are specified."); Console.WriteLine(" /noerr - discards error messages."); Console.WriteLine(" /delete - delete each duplicate file with confirmation."); Console.WriteLine(" /x - eXcludes if full file path starts with (or RegEx matches if /xr) one of the items following this switch until another switch is used."); Console.WriteLine(" /i - include if full file path starts with (or Regex matches if /ir) one of the items following this switch until another switch is used."); Console.WriteLine(" /xd - eXcludes all directories - minus drive/files - (using RegEx if /xdr) including subdirs following this switch until another switch is used."); Console.WriteLine(" /id - Include only directories - minus drive/files - (using RegEx if /idr) including subdirs following this switch until another switch is used."); Console.WriteLine(" /xf - eXcludes all files - minus drive/directories - (using RegEx if /xfr) following this switch until another switch is used."); Console.WriteLine(" /if - Include only files - minus drive/directories - (using RegEx if /ifr) following this switch until another switch is used."); Console.WriteLine(" [r] - Use regex for include/exclude by appending an 'r' to the option, e.g. -ir, -ifr, -idr, -xr, -xfr, -xdr."); Console.WriteLine(" /paths - not needed unless you want to specify files/dirs after an include/exclude without using another non-exclude/non-include option."); Console.WriteLine(" /xj - Exclude File and Directory Junctions."); Console.WriteLine(" "); Console.WriteLine("Examples: findup.exe c:\\\\finances /recurse /noerr /delete"); Console.WriteLine(" - Find dupes in c:\\\\finance."); Console.WriteLine(" - recurse all subdirs of c:\\\\finance."); Console.WriteLine(" - suppress error messages."); Console.WriteLine(" - deletes duplicates after consent is given."); Console.WriteLine(" findup.exe c:\\\\users\\\\alice\\\\plan.txt d:\\\\data /recurse /x d:\\\\data\\\\webpics"); Console.WriteLine(" - Find dupes in c:\\\\users\\\\alice\\\\plan.txt, d:\\\\data"); Console.WriteLine(" - recurse subdirs in d:\\\\data."); Console.WriteLine(" - exclude any files in d:\\\\data\\\\webpics and subdirs."); Console.WriteLine(" findup.exe c:\\\\data *.txt c:\\\\reports\\\\quarter.doc /xfr \\"(jim)\\""); Console.WriteLine(" - Find dupes in c:\\\\data, *.txt in current directory and c:\\\\reports\\\\quarter.doc"); Console.WriteLine(" - exclude any file with 'jim' in the name as specified by the Regex item \\"(jim)\\""); Console.WriteLine(" findup.exe c:\\\\data *.txt c:\\\\reports\\\\*quarter.doc /xr \\"[bf]\\" /ir \\"(smith)\\""); Console.WriteLine(" - Find dupes in c:\\\\data, *.txt in current directory and c:\\\\reports\\\\*quarter.doc"); Console.WriteLine(" - Include only files with 'smith' and exclude any file with letters b or f in the path name as specified by the Regex items \\"[bf]\\",\\"(smith)\\""); Console.WriteLine("Note: Exclude takes precedence over Include."); return; } if (optionsbools.ContainsKey(argitem)) { optionsbools[argitem] = true; optionskey = "/paths"; continue; } if (optionspaths.ContainsKey(argitem) || optionsregex.ContainsKey(argitem)) { optionskey = argitem; continue; } if (optionspaths.ContainsKey(optionskey)) optionspaths[optionskey].Add(args[i]); else { try { Regex rgx = new Regex(args[i], RegexOptions.Compiled); optionsregex[optionskey].Add(rgx); } catch (Exception e) {WriteErr("Regex compilation failed: " + e.Message);} } } if (optionspaths["/paths"].Count == 0) { WriteErr("No files, file specifications, or directories specified. Try findup.exe -help. Assuming current directory."); optionspaths["/paths"].Add("."); } Console.Write("Getting file info and sorting file list..."); getFiles(optionspaths["/paths"], "*.*", optionsbools["/recurse"], files); if (files.Count < 2) { WriteErr("\\nFindup.exe needs at least 2 files to compare. Try findup.exe -help"); Console.WriteLine("\\n"); return; } files.Sort(new FileLengthComparer()); Console.WriteLine("Completed!"); Console.Write("Building dictionary of file sizes, SHA512 hashes and full paths..."); var SizeHashFile = new Dictionary<long, Dictionary<string,List<FileInfo>>>(); long filesize = 0; for (i = 0; i < (files.Count - 1); i++) { if (files[i].Length != files[i + 1].Length) continue; var breakout = false; while (true) { filesize = (files[i].Length); try { var _SHA512 = SHA512.Create(); using (var fstream = File.OpenRead(files[i].FullName)) { _SHA512.ComputeHash(fstream); } string SHA512string = Hash2String(_SHA512.Hash); if (!SizeHashFile.ContainsKey(filesize)) SizeHashFile.Add(filesize, new Dictionary<string,List<FileInfo>>()); if (!SizeHashFile[filesize].ContainsKey(SHA512string)) { SizeHashFile[filesize][SHA512string] = new List<FileInfo>() {}; } SizeHashFile[filesize][SHA512string].Add(files[i]); } catch (Exception e) { WriteErr("Hash error: " + e.Message); } if (breakout == true) {break;} i++; if (i == (files.Count - 1)) { breakout = true; continue; } breakout = (files[i].Length != files[i + 1].Length); } if (SizeHashFile.ContainsKey(filesize)) { foreach (var HG in SizeHashFile[filesize]) { if (HG.Value.Count > 1) { Console.WriteLine("{0:N0} Duplicate files. {1:N0} Bytes each. {2:N0} Bytes total : ", HG.Value.Count, filesize, filesize * HG.Value.Count); foreach (var finfo in HG.Value) { Console.WriteLine(finfo.FullName); numOfDupes++; dupeBytes += finfo.Length; if (optionsbools["/delete"]) if (DeleteDupe(finfo)) { bytesrecovered += finfo.Length; deletedfiles++; } } } } } } Console.WriteLine("\\n "); Console.WriteLine("Files checked : {0:N0}", files.Count); // display statistics and return to OS. Console.WriteLine("Duplicate files : {0:N0}", numOfDupes); Console.WriteLine("Duplicate bytes : {0:N0}", dupeBytes); Console.WriteLine("Deleted duplicates : {0:N0}", deletedfiles); Console.WriteLine("Bytes recovered : {0:N0}", bytesrecovered); Console.WriteLine("Errors : {0:N0}", errors); Console.WriteLine("Execution time : " + (DateTime.Now - startTime)); } private static void WriteErr(string Str) { errors++; if (!optionsbools["/noerr"]) Console.WriteLine(Str); } private static string Hash2String(Byte[] hasharray) { string SHA512string = ""; foreach (var c in hasharray) { SHA512string += String.Format("{0:x2}", c); } return SHA512string; } private static Boolean DeleteDupe(FileInfo Filenfo) { Console.Write("Delete this file <y/N> <ENTER>?"); delconfirm = Console.ReadLine(); if ((delconfirm[0] == 'Y') || (delconfirm[0] == 'y')) { try { Filenfo.Delete(); Console.WriteLine("File Successfully deleted."); return true; } catch (Exception e) { Console.WriteLine("File could not be deleted: " + e.Message); } } return false; } private static Boolean CheckNames(string fullname) { var filePart = Path.GetFileName(fullname); // get file name only (e.g. "d:\\temp\\data.txt" -> "data.txt") var dirPart = Path.GetDirectoryName(fullname).Substring(fullname.IndexOf(Path.VolumeSeparatorChar)+2); // remove drive & file (e.g. "d:\\temp\\data.txt" -> "temp") if (CheckNamesWorker(fullname, "/x", "/xr", true)) return false; if (CheckNamesWorker(filePart, "/xf", "/xfr", true)) return false; if (CheckNamesWorker(dirPart, "/xd", "/xdr", true)) return false; if (CheckNamesWorker(fullname, "/i", "/ir", false)) return false; if (CheckNamesWorker(filePart, "/if", "/ifr", false)) return false; if (CheckNamesWorker(dirPart, "/id", "/idr", false)) return false; return true; } private static Boolean CheckNamesWorker(string filestr, string pathskey, string rgxkey, Boolean CheckType) { foreach (var filepath in optionspaths[pathskey]) { if (filestr.ToLower().StartsWith(filepath.ToLower()) == CheckType) return true; } foreach (var rgx in optionsregex[rgxkey]) { if (rgx.IsMatch(filestr) == CheckType) return true; } return false; } private static void getFiles(List<string> pathRec, string searchPattern, Boolean recursiveFlag, List<FileInfo> returnList) { foreach (string d in pathRec) { getFiles(d, searchPattern, recursiveFlag, returnList); } } private static void getFiles(string[] pathRec, string searchPattern, Boolean recursiveFlag, List<FileInfo> returnList) { foreach (string d in pathRec) { getFiles(d, searchPattern, recursiveFlag, returnList); } } private static void getFiles(string pathRec, string searchPattern, Boolean recursiveFlag, List<FileInfo> returnList) { string dirPart; string filePart; if (File.Exists(pathRec)) { try { FileInfo addf = (new FileInfo(pathRec)); if (((addf.Attributes & FileAttributes.ReparsePoint) == 0) || !optionsbools["/xj"]) if (CheckNames(addf.FullName)) returnList.Add(addf); } catch (Exception e) { WriteErr("Add file error: " + e.Message); } } else if (Directory.Exists(pathRec)) { try { DirectoryInfo Dir = new DirectoryInfo(pathRec); if (((Dir.Attributes & FileAttributes.ReparsePoint) == 0) || !optionsbools["/xj"]) foreach (FileInfo addf in (Dir.GetFiles(searchPattern))) { if (((addf.Attributes & FileAttributes.ReparsePoint) == 0) || !optionsbools["/xj"]) if (CheckNames(addf.FullName)) returnList.Add(addf); } } catch (Exception e) { WriteErr("Add files from Directory error: " + e.Message); } if (recursiveFlag) { try { getFiles((Directory.GetDirectories(pathRec)), searchPattern, recursiveFlag, returnList); } catch (Exception e) { WriteErr("Add Directory error: " + e.Message); } } } else { try { filePart = Path.GetFileName(pathRec); dirPart = Path.GetDirectoryName(pathRec); } catch (Exception e) { WriteErr("Parse error on: " + pathRec); WriteErr(@"Make sure you don't end a directory with a \\ when using quotes. The console arg parser doesn't accept that."); WriteErr("Exception: " + e.Message); return; } if (filePart.IndexOfAny(new char[] {'?','*'}) >= 0) { if ((dirPart == null) || (dirPart == "")) dirPart = Directory.GetCurrentDirectory(); if (Directory.Exists(dirPart)) { getFiles(dirPart, filePart, recursiveFlag, returnList); return; } } WriteErr("Invalid file path, directory path, file specification, or program option specified: " + pathRec); } } } }
combined_dataset/train/non-malicious/Convert-BounceToX_4.ps1
Convert-BounceToX_4.ps1
# $Id: Convert-BounceToX500.ps1 610 2010-11-16 00:39:19Z jon $ # $Revision: 610 $ #.Synopsis # Convert Bounce to X500 #.Description # Convert URL Encoded address in a Bounce message to an X500 address # that can be added as an alias to the mail-enabled object #.Parameter bounceAddress # URL Encoded bounce message address# #.Example # Convert-BounceToX500 "IMCEAEX-_O=CONTOSO_OU=First+20Administrative+20Group_cn=Recipients_cn=john+5Fjacob+2Esmith@contoso.com" #.Example # "IMCEAEX-_O=CONTOSO_OU=First+20Administrative+20Group_cn=Recipients_cn=john+5Fjacob+2Esmith@contoso.com"|Convert-BounceToX500 [CmdletBinding()] PARAM ( [Parameter(Mandatory=$true,ValueFromPipeline=$true)][string]$bounceAddress ) BEGIN { Add-Type -AssemblyName System.Web|Out-Null } PROCESS { if($_) {$bounceAddress = $_} $bounceAddress = $bounceAddress -Replace "%2B","%" # This is a urlEncoded "+" $bounceAddress = $bounceAddress -Replace "%3D","=" $bounceAddress = $bounceAddress -Replace "\\+","%" $bounceAddress = $bounceAddress -Replace "_O=","/O=" $bounceAddress = $bounceAddress -Replace "_OU=","/OU=" $bounceAddress = $bounceAddress -Replace "_CN=","/CN=" if([Web.HttpUtility]::UrlDecode($bounceAddress) -match "(/o=.*)@[\\w\\d.]+$"){$matches[1]} }
combined_dataset/train/non-malicious/428.ps1
428.ps1
Register-PSFTeppScriptblock -Name 'PSFramework.Message.Module' -ScriptBlock { Get-PSFMessage | Select-Object -ExpandProperty ModuleName | Select-Object -Unique } Register-PSFTeppScriptblock -Name 'PSFramework.Message.Function' -ScriptBlock { Get-PSFMessage | Select-Object -ExpandProperty FunctionName | Select-Object -Unique } Register-PSFTeppScriptblock -Name 'PSFramework.Message.Tags' -ScriptBlock { Get-PSFMessage | Select-Object -ExpandProperty Tags | Remove-PSFNull -Enumerate | Select-Object -Unique } Register-PSFTeppScriptblock -Name 'PSFramework.Message.Runspace' -ScriptBlock { Get-PSFMessage | Select-Object -ExpandProperty Runspace | Select-Object -Unique } Register-PSFTeppScriptblock -Name 'PSFramework.Message.Level' -ScriptBlock { Get-PSFMessage | Select-Object -ExpandProperty Level | Select-Object -Unique }
combined_dataset/train/non-malicious/ShowUI Clock 4.ps1
ShowUI Clock 4.ps1
New-UIWidget -AsJob -Content { $shadow = DropShadowEffect -Color Black -Shadow 0 -Blur 8 Grid { Ellipse -Fill Transparent -Stroke Black -StrokeThickness 4 -Width 300 -Height 300 Ellipse -Fill Transparent -Stroke Black -StrokeThickness 6 -Width 290 -Height 290 -StrokeDashArray 1,11.406 Ellipse -Fill Transparent -Stroke Black -StrokeThickness 10 -Width 280 -Height 280 -StrokeDashArray 64.25 Ellipse -Fill Transparent -Stroke Black -StrokeThickness 5 -Width 255 -Height 255 -StrokeDashArray 60,59 Ellipse -Name Hour -Fill Transparent -Stroke White -StrokeThickness 100 -Width 255 -Height 255 -StrokeDashArray 0.04,300 -RenderTransformOrigin "0.5,0.5" -RenderTransform { RotateTransform -Angle -90 } -Effect $shadow Ellipse -Name Minute -Fill Transparent -Stroke '#FFC0B7B7' -StrokeThickness 100 -Width 275 -Height 275 -StrokeDashArray 0.05,300 -RenderTransformOrigin "0.5,0.5" -RenderTransform { RotateTransform -Angle -90 } -Effect $shadow Ellipse -Name Second -Fill Transparent -Stroke '#FF31C2FF' -StrokeThickness 100 -Width 215 -Height 215 -StrokeDashArray 0.02,300 -RenderTransformOrigin "0.5,0.5" -RenderTransform { RotateTransform -Angle -90 } -Effect $shadow } } -Refresh "00:00:00.2" -Update { $now = Get-Date $deg = (1/60) * 360 $Hour.RenderTransform.Angle = $now.Hour * 5 * $deg -90 $Minute.RenderTransform.Angle = $now.Minute * $deg -90 $Second.RenderTransform.Angle = $now.Second * $deg -90 }
combined_dataset/train/non-malicious/3926.ps1
3926.ps1
function Test-AzureIotDpsLinkedHubLifeCycle { $Location = Get-Location "Microsoft.Devices" "Device Provisioning Service" $IotDpsName = getAssetName $ResourceGroupName = getAssetName $IotHubName = getAssetName $hubKeyName = "ServiceKey" $Sku = "S1" $LinkedHubName = [string]::Format("{0}.azure-devices.net",$IotHubName) $AllocationWeight = 10 $resourceGroup = New-AzResourceGroup -Name $ResourceGroupName -Location $Location $iotDps = New-AzIoTDps -ResourceGroupName $ResourceGroupName -Name $IotDpsName -Location $Location Assert-True { $iotDps.Name -eq $IotDpsName } Assert-True { $iotDps.Properties.IotHubs.Count -eq 0 } $iotHub = New-AzIoTHub -Name $IotHubName -ResourceGroupName $ResourceGroupName -Location $Location -SkuName $Sku -Units 1 Assert-True { $iotHub.Name -eq $IotHubName } $hubKeys = Add-AzIoTHubKey -Name $IotHubName -ResourceGroupName $ResourceGroupName -KeyName $hubKeyName -Rights ServiceConnect Assert-True { $hubKeys.Count -gt 1 } $hubKey = Get-AzIoTHubKey -Name $IotHubName -ResourceGroupName $ResourceGroupName -KeyName $hubKeyName $HubConnectionString = [string]::Format("HostName={0};SharedAccessKeyName={1};SharedAccessKey={2}",$iotHub.Properties.HostName,$hubKey.KeyName,$hubKey.PrimaryKey) $linkedHub = Add-AzIoTDpsHub -ResourceGroupName $ResourceGroupName -Name $IotDpsName -IotHubConnectionString $HubConnectionString -IotHubLocation $iotHub.Location Assert-True { $linkedHub.Count -eq 1 } Assert-True { $linkedHub.LinkedHubName -eq $iotHub.Properties.HostName } Assert-True { $linkedHub.Location -eq $iotHub.Location } $updatedLinkedHub = Update-AzIoTDpsHub -ResourceGroupName $ResourceGroupName -Name $IotDpsName -LinkedHubName $LinkedHubName -AllocationWeight $AllocationWeight Assert-False { $updatedLinkedHub.ApplyAllocationPolicy } Assert-True { $updatedLinkedHub.AllocationWeight -eq $AllocationWeight } $linkedHub1 = Get-AzIoTDpsHub -ResourceGroupName $ResourceGroupName -Name $IotDpsName -LinkedHubName $LinkedHubName Assert-True { $linkedHub1.Count -eq 1 } Assert-True { $linkedHub1.LinkedHubName -eq $LinkedHubName } Assert-True { $linkedHub1.Location -eq $Location } Assert-False { $linkedHub1.ApplyAllocationPolicy } Assert-True { $linkedHub1.AllocationWeight -eq $AllocationWeight } $result = Remove-AzIoTDpsHub -ResourceGroupName $ResourceGroupName -Name $IotDpsName -LinkedHubName $LinkedHubName -PassThru Assert-True { $result } Remove-AzResourceGroup -Name $ResourceGroupName -force }
combined_dataset/train/non-malicious/913.ps1
913.ps1
$sourceSubscriptionId='yourSourceSubscriptionId' $sourceResourceGroupName='mySourceResourceGroupName' $managedDiskName='myDiskName' Select-AzSubscription -SubscriptionId $sourceSubscriptionId $managedDisk= Get-AzDisk -ResourceGroupName $sourceResourceGroupName -DiskName $managedDiskName $targetSubscriptionId='yourTargetSubscriptionId' $targetResourceGroupName='myTargetResourceGroupName' Select-AzSubscription -SubscriptionId $targetSubscriptionId $diskConfig = New-AzDiskConfig -SourceResourceId $managedDisk.Id -Location $managedDisk.Location -CreateOption Copy New-AzDisk -Disk $diskConfig -DiskName $managedDiskName -ResourceGroupName $targetResourceGroupName
combined_dataset/train/non-malicious/sample_63_1.ps1
sample_63_1.ps1
# # Module manifest for module 'Az.StorageMover' # # Generated by: Microsoft Corporation # # Generated on: 7/4/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'Az.StorageMover.psm1' # Version number of this module. ModuleVersion = '1.4.0' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = 'd6053d97-1a9b-4fc6-9bd2-09c5b23b34db' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft Azure PowerShell: StorageMover cmdlets' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. DotNetFrameworkVersion = '4.7.2' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'StorageMover.Autorest/bin/Az.StorageMover.private.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'StorageMover.Autorest/Az.StorageMover.format.ps1xml' # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @('StorageMover.Autorest/Az.StorageMover.psm1') # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = 'Get-AzStorageMover', 'Get-AzStorageMoverAgent', 'Get-AzStorageMoverEndpoint', 'Get-AzStorageMoverJobDefinition', 'Get-AzStorageMoverJobRun', 'Get-AzStorageMoverProject', 'New-AzStorageMover', 'New-AzStorageMoverAzSmbFileShareEndpoint', 'New-AzStorageMoverAzStorageContainerEndpoint', 'New-AzStorageMoverJobDefinition', 'New-AzStorageMoverNfsEndpoint', 'New-AzStorageMoverProject', 'New-AzStorageMoverSmbEndpoint', 'New-AzStorageMoverUploadLimitWeeklyRecurrenceObject', 'Remove-AzStorageMover', 'Remove-AzStorageMoverEndpoint', 'Remove-AzStorageMoverJobDefinition', 'Remove-AzStorageMoverProject', 'Start-AzStorageMoverJobDefinition', 'Stop-AzStorageMoverJobDefinition', 'Unregister-AzStorageMoverAgent', 'Update-AzStorageMover', 'Update-AzStorageMoverAgent', 'Update-AzStorageMoverAzSmbFileShareEndpoint', 'Update-AzStorageMoverAzStorageContainerEndpoint', 'Update-AzStorageMoverJobDefinition', 'Update-AzStorageMoverNfsEndpoint', 'Update-AzStorageMoverProject', 'Update-AzStorageMoverSmbEndpoint' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module # VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = 'New-AzStorageMoverSmbFileShareEndpoint', 'Update-AzStorageMoverSmbFileShareEndpoint' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module ModuleList = @(@{ModuleName = 'Az.Accounts'; ModuleVersion = '3.0.1'; }) # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Azure','ResourceManager','ARM','PSModule','StorageMover' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' # A URL to the main website for this project. ProjectUri = 'https://github.com/Azure/azure-powershell' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = '* Added input parameter validation set for UploadLimitWeeklyRecurrenceObject * Supported Uploaded Limit Schedule' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCClgRVJ/LCy8QkY # pkzFyUPVoNBCTn/PpZC6KCE5z0ld8KCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIJc # 7FtlutZ2jxO6nggHorV+hGGAwg1q1A4fLDQfupfBMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEATuaQcAJiNH1oaIaTvgsHiBCf8vC6hr4mqOPD # EU9pDY1fqr2aodTl7s6Wq7Zi2TIJSUtYJ4fwarzgexJpvy1r3HEFQNv0iVnho4o3 # kHXwt3Qq8247MDkSBebfLutj77Aht0HtpaWn6UImHtIpQbOw+unTrc35bF8j98ZK # uNaVcIsJjObYM+EgazY9QERbn0+3h2dtBtGUj1Co9TM0vOznFvugNs+tg+sKHGFE # EUE2ZarwaRnKHEAcjg0wjzmhmqI2Un+ItRW2EF+/clpRLg+iWCrgpYET1d43mWqz # 0HPjQmlfcMCN+UT2Nokbj94mWnkFkg8aQBhzir4jZId9pJb5JqGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBNI/zbWa+1J9Wb0b+0E55FK/a1f1tn/5gx # M2flV/4TMAIGZpV2VPqeGBMyMDI0MDczMTA3MTQxNS43MjhaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwAB # AAAB6jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rW # b2ksqaF65QtJkbQpmsc6G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T # 0KfylTulrzKtgxnxZh7q1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGo # n/4VDHnZhdas22svSC5GHywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB # +KHCy08ds36an7IcOGfRmhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjA # lsBBHD1TdGBucrGC3TQXSTp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1f # xYk2nY6SCKsV+VmtV5aiPzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEU # TBPXME/ia+t8jrT2y3ug15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM # 3HPVJJ19vOSvrCP9lsEcEwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp # 081X5RQ6HGVUz6ZdgQ0jcT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc # 9KHKTWfXpAVj1Syqt5X4nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8 # HUVMp+mAA4rXjOw42vkHfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebp # F0BU1MTIcosFblleMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxV # bX3G37KgvyoNAnuu2w3HoWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI5 # 3kOWSaWCaV3xCznpRt3c4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqe # kZb4ivMR6LoPb5HNlq0WbBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8Cx # iAg2KlbPyMwBOPcr9hJT8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzE # GafPUwLmoETihOGLqIQlCpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3Qd # iNS8u9ujYh1B7NLr6t3IglfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2 # JG5BYu/XitRE8cdzaJmDVBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dix # UxE4qlfUPMixGr0Ft4/S0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi # 5auiqB6xQBADUf+F7hSKZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Q # bt45Cz/QMa7EmMGNn7a8MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5D # r5m3T4bDj9WTNLgP8SFe3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCJ2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6lO6DDAi # GA8yMDI0MDczMDE5MTQyMFoYDzIwMjQwNzMxMTkxNDIwWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqU7oMAgEAMAcCAQACAgvzMAcCAQACAhQnMAoCBQDqVQuMAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBADjKbC8ldMcp7f0X71J3jXissmMC # Dxt8Mjw6B0yEW/C8EChgM3TS2U0LRt2j1X12vDQE+pipb2UBopcWnCEz4XeY9p6T # RdjsQOh+BOGHbwZWTRJFgj4uZV8zG1Q+rSjvBupCKJimw9brzx1LSqgk1jXWqPb2 # abSD30lPy5mPHZ2UOfS2nW587lQglkU00l+HMIIKZAELto00FRmpz0TjtnxI8iBX # yRyRZno8VZ+Breg+ubQ+OVr1ltpwbzG+EBJX6uRVMpSOZQnsKkqdvyr6yX6hDqmC # E7ZRLejomFrlpxKANlnhW55FAFURWbPQaXU6EZLj8qVIASmc0IGLopgrzLwxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqa # JHLVWT9hYwABAAAB6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCWSCvkd+UUYZ4q5FYwVKRKvnTF # 5tnBROf28nFvD4c3NzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXj # ZDR4iwg0ltLANXBh5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQg6ZhhARlA # n2cpH/HgQjy3Qr5WAQjxiQZKKt5vT/iGXsEwDQYJKoZIhvcNAQELBQAEggIASgHF # JmlFFNhDN1b78tL0GI2H9Xs9O8ShbKkGYAAytCJfm+KFQO+iImsE3ipEjYRaKBja # ZHiruBmJvtdqsmtiCnVH0yTvTfEu4WmluLGvwh9prTSTW8D1a7LgO3ysTZL468pW # exm/plNxDXotlcUQSRYEBFc7e7p+OQUlBQP5ovejV5v3QxDfOdcPIYpJUoU7xbUO # bJ5g1Z2K+d4MWrWJPrdvL7v3Oi2qqoeBf/O/0QjEqoKZQi3nVTWU1GMg3uQCpSd4 # 36S02g+52sH82S72dyR++shlWlO7L7n0TbbhzS3sXjswkcBkPXuYdDWNsxtmeTmd # 12bPNDVuJUQ6wIWFxDZnzqi0lAeUfdhA17ia1j8LFJ96HN3lMbt4oMEX2isZSkSS # ffPdmGz9l8R6GMDF2jjxy8q3qVwwCDHSLS+FhK78yMJBnCM7Uz9E6SlZ+4v+rQlQ # ZkMq9U3tMvwCMMGgxYlR7m1Ka6eXZZd6CJev5JPdXQQ5y48WgnqNgfa1locyxVQm # Ga/oUoxeTbTtPbhtIPO1okGybJW5dhbMrYmIctx0B+8t4z05hnlsUTOKxOGx56jI # wusVLo0roXQ3jJg7pV71+Xaz1quCmS81Blb8jnvB4CXwruViocO24uoT6IVLqGe0 # u+M4F2GE0I4J+5yleXHibIvpcbWfiu5QmisLyAo= # SIG # End signature block
combined_dataset/train/non-malicious/871.ps1
871.ps1
function Start-PigJob { $ErrorActionPreference = "Stop" $context = Get-AzContext if ($context -eq $null) { Connect-AzAccount } $context $clusterName = Read-Host -Prompt "Enter the HDInsight cluster name" $creds=Get-Credential -Message "Enter the login for the cluster" $QueryString = "LOGS = LOAD '/example/data/sample.log';" + "LEVELS = foreach LOGS generate REGEX_EXTRACT(`$0, '(TRACE|DEBUG|INFO|WARN|ERROR|FATAL)', 1) as LOGLEVEL;" + "FILTEREDLEVELS = FILTER LEVELS by LOGLEVEL is not null;" + "GROUPEDLEVELS = GROUP FILTEREDLEVELS by LOGLEVEL;" + "FREQUENCIES = foreach GROUPEDLEVELS generate group as LOGLEVEL, COUNT(FILTEREDLEVELS.LOGLEVEL) as COUNT;" + "RESULT = order FREQUENCIES by COUNT desc;" + "DUMP RESULT;" $pigJobDefinition = New-AzHDInsightPigJobDefinition ` -Query $QueryString ` -Arguments "-w" Write-Host "Start the Pig job ..." -ForegroundColor Green $pigJob = Start-AzHDInsightJob ` -ClusterName $clusterName ` -JobDefinition $pigJobDefinition ` -HttpCredential $creds Write-Host "Wait for the Pig job to complete ..." -ForegroundColor Green Wait-AzHDInsightJob ` -ClusterName $clusterName ` -JobId $pigJob.JobId ` -HttpCredential $creds Write-Host "Display the standard output ..." -ForegroundColor Green Get-AzHDInsightJobOutput ` -ClusterName $clusterName ` -JobId $pigJob.JobId ` -HttpCredential $creds }
combined_dataset/train/non-malicious/sample_16_0.ps1
sample_16_0.ps1
##---------------------------------------------------------------------------- ## Copyright (c) Axis Communications AB, SWEDEN. All rights reserved. ##---------------------------------------------------------------------------- # Import string constants . ./StringConstants.ps1 Stop-Service -Name $ServiceConstants.serviceName # SIG # Begin signature block # MIIoIgYJKoZIhvcNAQcCoIIoEzCCKA8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAW7wwqQJ4OHGcv # 6bLN7vx21lDcEnYp8vpAWEb+0YOYFqCCDY4wggawMIIEmKADAgECAhAIrUCyYNKc # TJ9ezam9k67ZMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV # BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0z # NjA0MjgyMzU5NTlaMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg # SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg # UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw # ggIKAoICAQDVtC9C0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0 # JAfhS0/TeEP0F9ce2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJr # Q5qZ8sU7H/Lvy0daE6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhF # LqGfLOEYwhrMxe6TSXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+F # LEikVoQ11vkunKoAFdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh # 3K3kGKDYwSNHR7OhD26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJ # wZPt4bRc4G/rJvmM1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQay # g9Rc9hUZTO1i4F4z8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbI # YViY9XwCFjyDKK05huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchAp # QfDVxW0mdmgRQRNYmtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRro # OBl8ZhzNeDhFMJlP/2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IB # WTCCAVUwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+ # YXsIiGX0TkIwHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0P # AQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAk # BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAC # hjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9v # dEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5j # b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAED # MAgGBmeBDAEEATANBgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql # +Eg08yy25nRm95RysQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFF # UP2cvbaF4HZ+N3HLIvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1h # mYFW9snjdufE5BtfQ/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3Ryw # YFzzDaju4ImhvTnhOE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5Ubdld # AhQfQDN8A+KVssIhdXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw # 8MzK7/0pNVwfiThV9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnP # LqR0kq3bPKSchh/jwVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatE # QOON8BUozu3xGFYHKi8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bn # KD+sEq6lLyJsQfmCXBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQji # WQ1tygVQK+pKHJ6l/aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbq # yK+p/pQd52MbOoZWeE4wggbWMIIEvqADAgECAhAILYwW0nV0JkMDtityXUvoMA0G # CSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg # SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg # UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwHhcNMjQwMjEyMDAwMDAwWhcNMjcwMjEx # MjM1OTU5WjBeMQswCQYDVQQGEwJTRTENMAsGA1UEBxMETHVuZDEfMB0GA1UEChMW # QXhpcyBDb21tdW5pY2F0aW9ucyBBQjEfMB0GA1UEAxMWQXhpcyBDb21tdW5pY2F0 # aW9ucyBBQjCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAOk0Sr22C6QH # zDpps6p3+m4c4HrGKW9dju1+awvCWpNnrTrCxxcqC7Fexgt3VVR2GfI+hEHrkSV9 # hq7tCT20No1s4OqGdB/FasUvqq8jCuoXKQQnd5gqFhFz/aL+1ocr2NvtCsxuNihB # UA3isiFf0R0uXcEIoi+tUiy0vJf5ZstopMEuSSOZlANhdWvwBTd8DL1EBYDp4Z/t # 1kWLax6NI8fim1MJxi5OaVUd1haFQMbzeBiwDXlMVJCyYcSVH7fuKCRhoem4pX1g # fdbM3yfhigegJPRui13ai6I69X71GoyRCBnkCgkrw8nUrOHGjrTe90sXLvVSU0Yu # j3VZzcDkdxN16tHG2SK3NT/7d5EmgrUSwabvS36sTRy0VeSCmop4ByDlTUCljGiP # cDO5viiyDF9SRbKa0BSuVAB9xtaaqjw9+sWRxiUqHVq8cRPOylBcziOMVFSE4ENc # aH3A55N2kb2tBalRm0GPfvB1wRzHdow/ArdGYB1FYIrBi2IUcUsgKwIDAQABo4IC # AzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHQYDVR0OBBYE # FCCITo81URSaUaiF+AwqLquw/5UcMD4GA1UdIAQ3MDUwMwYGZ4EMAQQBMCkwJwYI # KwYBBQUHAgEWG2h0dHA6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAOBgNVHQ8BAf8E # BAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwgbUGA1UdHwSBrTCBqjBToFGgT4ZN # aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0Q29kZVNp # Z25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5jcmwwU6BRoE+GTWh0dHA6Ly9jcmw0 # LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5 # NlNIQTM4NDIwMjFDQTEuY3JsMIGUBggrBgEFBQcBAQSBhzCBhDAkBggrBgEFBQcw # AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMFwGCCsGAQUFBzAChlBodHRwOi8v # Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmlu # Z1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJBgNVHRMEAjAAMA0GCSqGSIb3DQEB # CwUAA4ICAQBTl/rp/1EMC6RXuNwZmY8QNQpzSOODOmLbFU1hMlHq/iipWO+tsAnH # fB4CnZlrbgkVa64syckD29gWMrYp2PMdTwsL/vHmUI0lZj1pJ3zCvB5E+4CnKkhY # SIre1yukMyzbHR5y5X2bQ6kVtR0mkKqDTrT+vm6abBMmNcVwc+j5IJ9viHspncAs # X/t7gnYDmMnHCWTQwR01wNYypEbmpf5ZtF8233I5toy+x2TGBx7PToduYzxWiF9G # Hd18UNGuyNjsLPnHI0cY3vGNMo5GiaisR9e/CHYUq149MduRRifz9kkq8JA81k0j # +DEsZb8lOORoA7gte007xnesv35OL4ezbfhjkKYICGjRVSB/Xu8YhH04Xs6AbFWB # Boqi9/DH9RV3S0LH+JzxNIeDUw8LW7VNYrSOHWuRqPSazmtWll+MQUDV0p4LIUMl # EjoUNsRBvsDYSMiZSTNizMgyp437XDv25+iO8GMtiKlymsOPuKYALFVn0TJxdIet # ID0HnXa560C3FysEDxsGbVCI6L1l9j5RCmmF1qUs7o2oczvlDyplesA0sNOSlpJF # xyTgvlXXloxJCH7Yaz/2ItvhfMt1CZhMtyp38Y1yWlgMqSTrlJVxAcXHOXzu/mEM # aNvDTqF/zGnW5todKFHL092hQqm+8xGNOjL0C8G+ByZ2tzSh3y1R7jGCGeowghnm # AgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMUEw # PwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0IENvZGUgU2lnbmluZyBSU0E0MDk2 # IFNIQTM4NCAyMDIxIENBMQIQCC2MFtJ1dCZDA7Yrcl1L6DANBglghkgBZQMEAgEF # AKB8MBAGCisGAQQBgjcCAQwxAjAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE # MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAS # smX1d620XZjZ7nRh//JATWCW3XKXO16V9PuN9wb59jANBgkqhkiG9w0BAQEFAASC # AYBs6wN8g3lv+5iR6ZT/tsdTc9+/zrkZaV77f2gJ2rGZXmevQ6+quX2Oem2UODSd # dG9uz+KPRTwzcQ/CBiBVocvmhdB5rKe84vFjp+rbP7cHICsdnhAukiDDwFIPkHe8 # 8gOLY1RBA25iSc4UGidpcGt2qx1Z2Ji0aRqiY2vdPheI76WIMGTT7knFOzTQEkZl # VVxxlx5NGmU9jE22pmQ4kt3ylKoGASZ43omj0VAPpdPue3sq00p69NkAAKkwDAYw # ylWrZYOt6T6nEA+zgOEzvbV0dj0NYRy9tHpF2GVawI1oJG/woDa4HRjZDYkOIii/ # GX689G9NS+t8C6lK9UOi5qmY89EnTGihNP8Scz94r4Nle/ubjhyg1w1Cww1Zivne # 5u4rrD+S1xG5HLBa+2WVcWpD2Zx+laMML5y3L/GNswRg+7/9XHG1rNoxKdm95EH1 # uj+6F4mnA6kVwhHCOtsFBb0WENTsHMQgL1HG/t5AO0RS+qvTkzWa8kmKhUhXWra8 # tLShghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG9w0BBwKgghcZMIIX # FQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEEoGkEZzBlAgEBBglg # hkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgJycv/TLLs/RksM5GDdfg6HtjLtvD # 8v5WTI448DYPaYsCEQDY7rEwXOK5cqOd1ytPs7InGA8yMDI0MDkyMDA5NTUzOFqg # ghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjANBgkqhkiG9w0BAQsF # ADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNV # BAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1w # aW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1OVowSDELMAkGA1UE # BhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYDVQQDExdEaWdpQ2Vy # dCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfcYhVYwamTEafNqrJq # 3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD1isgHMGXlLSlUIHy # z8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd/nFexAaaPPDFLnkP # G2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH13gpOWvgeFmX40Qr # StWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk9R28mxyyt1/f8O52 # fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495uZBkHNwGRDxy1Uc2q # TGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPTaR58ZE2dD9/O0V6M # qqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6FaXXHg2TWdc2PEnZW # pST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+uG+W1eEQE/5hRwqM # /vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRwo+wK8REuZODLIivK # 8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMBAAGjggGLMIIBhzAO # BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEF # BQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwHwYDVR0jBBgw # FoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW27xPn783QZKHVVqll # MaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNv # bS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5j # cmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5k # aWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0 # LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdD # QS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xwjU+KPGic2CX/yyzk # zepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt7T1IjrhrunxdvcJh # N2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2V3mP2yZWK7Dzp703 # DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJpddNQ5EQSviANnqlE # 0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqXTzON1I13fXVFoaVY # JmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3701S88lgIcRWR+3a # EUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNKqDbUuXKWfpd5OEhf # ysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7B145WPR8czFVoIAR # yxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFGhmu6F/3Ed2wVbK6r # r3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBcYLso/zjlUlrWrBci # I0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflrLAZG70Ee8PBf4NvZ # rZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0oZipeWzANBgkqhkiG # 9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkw # FwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVz # dGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIyMjM1OTU5WjBjMQsw # CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRp # Z2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENB # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1BkmzwT1ySVFVxyUD # xPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3znIkLf50fng8zH1AT # CyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZKz5C3GeO6lE98NZW # 1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald68Dd5n12sy+iEZLRS # 8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zkpsUdzTYNXNXmG6jB # ZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYnLvWHpo9OdhVVJnCY # Jn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIqx5K/oN7jPqJz+ucf # WmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOdOqPVA+C/8KI8ykLc # GEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJTYsg0ixXNXkrqPNF # YLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJRk8mMDDtbiiKowSYI # +RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEoAA6EVO7O6V3IXjAS # vUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1UdEwEB/wQIMAYBAf8C # AQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8GA1UdIwQYMBaAFOzX # 44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggr # BgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3Nw # LmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2NhY2VydHMuZGlnaWNl # cnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYDVR0fBDwwOjA4oDag # NIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RH # NC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMA0GCSqGSIb3 # DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0TzzBTzr8Y+8dQXeJL # Kftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYSlm/EUExiHQwIgqgW # valWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaqT5Fmniye4Iqs5f2M # vGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl2szwcqMj+sAngkSu # mScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1yr8THwcFqcdnGE4AJ # xLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05et3/JWOZJyw9P2un # 8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6umAU+9Pzt4rUyt+8SV # e+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSweJywm228Vex4Ziza4 # k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr7ZVBtzrVFZgxtGIJ # Dwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYCJtnwZXZCpimHCUcr # 5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzgaoSv27dZ8/DCCBY0w # ggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcNAQEMBQAwZTELMAkG # A1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRp # Z2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJlZCBJRCBSb290IENB # MB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjELMAkGA1UEBhMCVVMx # FTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNv # bTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0MIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBpM+zCpyUuySE98orY # WcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR0uRf1gU8Ug9SH8ae # FaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0O21x4i0MG+4g1ckg # HWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53yEioZldXn1RYjgwr # t0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4x7axxLVqGDgDEI3Y # 1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3VdeGbZOjFEmjNAvwjX # WkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1CdoeJl2l6SPDgohIb # Zpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJhbesz2cXfSwQAzH0c # lcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz0YkH4b235kOkGLim # dwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNBERJb5RBQ6zHFynIW # IgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+CiaZ9eRpL5gdLfXZ # qbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFOzX # 44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0ksuCMS1Ri6enIZ3z # bcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGswJAYIKwYBBQUHMAGG # GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcwAoY3aHR0cDovL2Nh # Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENBLmNydDBF # BgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNl # cnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYEVR0gADANBgkqhkiG # 9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqsoYcs7IVeqRq7IviH # GmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPITtAq3votVs/59Pes # MHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZqPC/Lwum6fI0POz3 # A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/voVA9/HYJaISfb8rb # II01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+cWojayL/ErhULSd+ # 2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNyAgEBMHcwYzELMAkG # A1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTswOQYDVQQDEzJEaWdp # Q2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVTdGFtcGluZyBDQQIQ # BUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAaBgkqhkiG9w0BCQMx # DQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDkyMDA5NTUzOFowKwYL # KoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnGTxmcz0AwLwYJKoZI # hvcNAQkEMSIEIJ6vzYzS37Xy9GHCtReQ6tUGLASl3FidbzMGWhV9rSweMDcGCyqG # SIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+CitpVmq4zFq9NGprU # DHgoMA0GCSqGSIb3DQEBAQUABIICAI3lmFvoMG/s+IpgKF8RfaZJo34x0D7U/+Q+ # BLirQTEZrQRiqV5O0oo0IWaFEhfrasyv/WCH49cM3S4Ro9LtH90zE3jIpK7vNBCH # 5W5mS78qfDZrnXUOknXKWqdZsRql26SpKIzJcFhaJ+6iDKj42szk7GzacThuIYOK # 2t81QvuC2LaeCOs8K5zRrDJmbFylrS1LoaSxslq1gMx7udwoCrmlaCRFfrQcI/D6 # mWP6O7dKOyDp8clqfVNiQdYsWAYpZGjQaO7WXFmuIx25wesgg9bpu5PVYMJ/UNHk # I6QsWy+HavwFhATSYnjWWt5QhczpYc3/+ChsWKK7v8tTrfUW4Qq4v3OkJBMU7Gtu # q3l6WyYjgDx35VBeYFND6SVx6NhmCmSD+8ikWiF5klSh192YE2wTrlf05AlofyTy # whDCROLw7bDWkx6Jmt9HZCtE+A3Atxyc98Z8+bpamU/gw179qYTs+9D/6PixnQ5v # ez0u0GCKlpyGFsBYmmL0wrQH80/+kzzRzuUbJHSqkgFeMiQPcEgsmWFXqQPQuyD3 # wCI7RiSoR0VRtrzWVoJZO3GRVQBs+70ykMJsMFpGV/PeTelPDbftdOIGmy/rY4YB # iy4JuBgdRHFeUWScDGjMw4SyqlFWyxHeRaaycLNJY1WnXVjD5jvA0SZfgKEX7BfX # a0bx3+GP # SIG # End signature block
combined_dataset/train/non-malicious/109.ps1
109.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"   $redirectUri = "urn:ietf:wg:oauth:2.0:oob"   $resourceAppIdURI = "https://graph.microsoft.com"   $authority = "https://login.microsoftonline.com/$Tenant"   try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-CorporateDeviceIdentifiers(){ [cmdletbinding()] $graphApiVersion = "beta" $Resource = "deviceManagement/importedDeviceIdentities" try { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).value } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $ExportPath = Read-Host -Prompt "Please specify a path to export Corporate Device Identifiers to e.g. C:\IntuneOutput" if(!(Test-Path "$ExportPath")){ Write-Host Write-Host "Path '$ExportPath' doesn't exist, do you want to create this directory? Y or N?" -ForegroundColor Yellow $Confirm = read-host if($Confirm -eq "y" -or $Confirm -eq "Y"){ new-item -ItemType Directory -Path "$ExportPath" | Out-Null Write-Host } else { Write-Host "Creation of directory path was cancelled..." -ForegroundColor Red Write-Host break } } Write-Host $FileName_CSV = "CorpDeviceIdentifiers" + "_" + $(get-date -f dd-MM-yyyy-H-mm-ss) + ".csv" $CDI = Get-CorporateDeviceIdentifiers if($CDI){ foreach($CD in $CDI){ $IDI = $CD.importedDeviceIdentifier $Desc = $CD.description Write-Host "Adding '$IDI,$Desc' to '$FileName_CSV'..." -ForegroundColor Gray Add-Content -Value "$IDI,$Desc" -Path "$ExportPath\$FileName_CSV" } } else { Write-Host "No Corporate Device Identifiers found..." -ForegroundColor Red } Write-Host
combined_dataset/train/non-malicious/3024.ps1
3024.ps1
Set-StrictMode -Version Latest $functionName = '01c1a57716fe4005ac1a7bf216f38ad0' if (Test-Path Function:\$functionName) { Remove-Item Function:\$functionName -Force -ErrorAction Stop } function global:01c1a57716fe4005ac1a7bf216f38ad0 { return 'Original Function' } function script:Testing { return 'Script scope' } Describe 'Mocking Global Functions - Part One' { Mock $functionName { return 'Mocked' } It 'Mocks the global function' { & $functionName | Should -Be 'Mocked' } }
combined_dataset/train/non-malicious/126.ps1
126.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null   $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } }   Function Add-WindowsInformationProtectionPolicy(){ [cmdletbinding()] param ( $JSON ) $graphApiVersion = "Beta" $Resource = "deviceAppManagement/windowsInformationProtectionPolicies" try { if($JSON -eq "" -or $JSON -eq $null){ write-host "No JSON specified, please specify valid JSON for the iOS Policy..." -f Red } else { Test-JSON -JSON $JSON $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $JSON -ContentType "application/json" } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Add-MDMWindowsInformationProtectionPolicy(){ [cmdletbinding()] param ( $JSON ) $graphApiVersion = "Beta" $Resource = "deviceAppManagement/mdmWindowsInformationProtectionPolicies" try { if($JSON -eq "" -or $JSON -eq $null){ write-host "No JSON specified, please specify valid JSON for the iOS Policy..." -f Red } else { Test-JSON -JSON $JSON $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $JSON -ContentType "application/json" } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Assign-WindowsInformationProtectionPolicy(){ [cmdletbinding()] param ( $Id, $TargetGroupId ) $graphApiVersion = "Beta" try { if(!$Id){ write-host "No Policy Id specified, specify a valid Application Id" -f Red break } if(!$TargetGroupId){ write-host "No Target Group Id specified, specify a valid Target Group Id" -f Red break } $JSON = @" { "assignments": [ { "target": { "groupId": "$TargetGroupId", "@odata.type": " } } ] } "@ $uri = "https://graph.microsoft.com/beta/deviceAppManagement/windowsInformationProtectionPolicies('$ID')/assign" Invoke-RestMethod -Uri $uri -Method Post -ContentType "application/json" -Body $JSON -Headers $authToken } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Assign-MDMWindowsInformationProtectionPolicy(){ [cmdletbinding()] param ( $Id, $TargetGroupId ) $graphApiVersion = "Beta" try { if(!$Id){ write-host "No Policy Id specified, specify a valid Application Id" -f Red break } if(!$TargetGroupId){ write-host "No Target Group Id specified, specify a valid Target Group Id" -f Red break } $JSON = @" { "assignments": [ { "target": { "groupId": "$TargetGroupId", "@odata.type": " } } ] } "@ $uri = "https://graph.microsoft.com/beta/deviceAppManagement/mdmWindowsInformationProtectionPolicies('$ID')/assign" Invoke-RestMethod -Uri $uri -Method Post -ContentType "application/json" -Body $JSON -Headers $authToken } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Get-EnterpriseDomain(){ try { $uri = "https://graph.microsoft.com/v1.0/domains" $domains = (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value $EnterpriseDomain = ($domains | ? { $_.isInitial -eq $true } | select id).id return $EnterpriseDomain } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Get-AADGroup(){ [cmdletbinding()] param ( $GroupName, $id, [switch]$Members ) $graphApiVersion = "v1.0" $Group_resource = "groups" try { if($id){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=id eq '$id'" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value } elseif($GroupName -eq "" -or $GroupName -eq $null){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value } else { if(!$Members){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value } elseif($Members){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'" $Group = (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value if($Group){ $GID = $Group.id $Group.displayName write-host $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)/$GID/Members" (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value } } } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Test-JSON(){ param ( $JSON ) try { $TestJSON = ConvertFrom-Json $JSON -ErrorAction Stop $validJson = $true } catch { $validJson = $false $_.Exception } if (!$validJson){ Write-Host "Provided JSON isn't in valid JSON format" -f Red break } } Write-Host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ Write-Host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow Write-Host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $AADGroup = Read-Host -Prompt "Enter the Azure AD Group name where policies will be assigned" $TargetGroupId = (get-AADGroup -GroupName "$AADGroup").id if($TargetGroupId -eq $null -or $TargetGroupId -eq ""){ Write-Host "AAD Group - '$AADGroup' doesn't exist, please specify a valid AAD Group..." -ForegroundColor Red Write-Host exit } Write-Host $EnterpriseDomain = Get-EnterpriseDomain $Sharepoint = $EnterpriseDomain.Split(".")[0] $ManagedAppPolicy_WIP = @" { "description": "", "displayName": "Win10 WIP WE Policy - Assigned", "enforcementLevel": "encryptAuditAndPrompt", "enterpriseDomain": "$EnterpriseDomain", "enterpriseProtectedDomainNames": [], "protectionUnderLockConfigRequired": false, "dataRecoveryCertificate": null, "revokeOnUnenrollDisabled": false, "revokeOnMdmHandoffDisabled": false, "rightsManagementServicesTemplateId": null, "azureRightsManagementServicesAllowed": false, "iconsVisible": true, "protectedApps": [ { "@odata.type": " "description": "", "displayName": "Microsoft Teams", "productName": "*", "publisherName": "O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false, "binaryName": "teams.exe", "binaryVersionLow": "*", "binaryVersionHigh": "*" }, { "@odata.type": " "description": "", "displayName": "Microsoft Remote Desktop", "productName": "*", "publisherName": "O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false, "binaryName": "mstsc.exe", "binaryVersionLow": "*", "binaryVersionHigh": "*" }, { "@odata.type": " "description": "", "displayName": "Microsoft Paint", "productName": "*", "publisherName": "O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false, "binaryName": "mspaint.exe", "binaryVersionLow": "*", "binaryVersionHigh": "*" }, { "@odata.type": " "description": "", "displayName": "Notepad", "productName": "*", "publisherName": "O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false, "binaryName": "notepad.exe", "binaryVersionLow": "*", "binaryVersionHigh": "*" }, { "@odata.type": " "description": "", "displayName": "Microsoft OneDrive", "productName": "*", "publisherName": "O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false, "binaryName": "onedrive.exe", "binaryVersionLow": "*", "binaryVersionHigh": "*" }, { "@odata.type": " "description": "", "displayName": "IE11", "productName": "*", "publisherName": "O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false, "binaryName": "iexplore.exe", "binaryVersionLow": "*", "binaryVersionHigh": "*" }, { "@odata.type": " "description": "", "displayName": "Company Portal", "productName": "Microsoft.CompanyPortal", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Microsoft Messaging", "productName": "Microsoft.Messaging", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Microsoft Movies and TV", "productName": "Microsoft.ZuneVideo", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Groove Music", "productName": "Microsoft.ZuneMusic", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Microsoft Photos", "productName": "Microsoft.Windows.Photos", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Mail and Calendar for Windows 10", "productName": "microsoft.windowscommunicationsapps", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "OneNote", "productName": "Microsoft.Office.OneNote", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "PowerPoint Mobile", "productName": "Microsoft.Office.PowerPoint", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Excel Mobile", "productName": "Microsoft.Office.Excel", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Word Mobile", "productName": "Microsoft.Office.Word", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Microsoft People", "productName": "Microsoft.People", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Microsoft Edge", "productName": "Microsoft.MicrosoftEdge", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false } ], "exemptApps": [], "protectedAppLockerFiles": [ { "displayName": "Denied-Downlevel-Office-365-ProPlus.xml", "fileHash": "69f299b4-e4aa-48d1-8c6a-49600133d832", "file": "<AppLockerPolicy Version="1">
<RuleCollection Type="Exe" EnforcementMode="Enabled">
  <FilePublisherRule Id="b005eade-a5ee-4f5a-be45-d08fa557a4b2" Name="MICROSOFT OFFICE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
  </FilePublisherRule>
  <FilePublisherRule Id="de9f3461-6856-405d-9624-a80ca701f6cb" Name="MICROSOFT OFFICE 2003, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2003" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
  </FilePublisherRule>
  <FilePublisherRule Id="ade1b828-7055-47fc-99bc-432cf7d1209e" Name="2007 MICROSOFT OFFICE SYSTEM, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="2007 MICROSOFT OFFICE SYSTEM" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
  </FilePublisherRule>
  <FilePublisherRule Id="f6a075b5-a5b5-4654-abd6-731dacb40d95" Name="MICROSOFT OFFICE ONENOTE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE ONENOTE" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="12.0.9999.9999" />
      </FilePublisherCondition>
    </Conditions>
  </FilePublisherRule>
  <FilePublisherRule Id="0ec03b2f-e9a4-4743-ae60-6d29886cf6ae" Name="MICROSOFT OFFICE OUTLOOK, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE OUTLOOK" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="12.0.9999.9999" />
      </FilePublisherCondition>
    </Conditions>
  </FilePublisherRule>
  <FilePublisherRule Id="7b272efd-4105-4fb7-9d40-bfa597c6792a" Name="MICROSOFT OFFICE 2013, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2013" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
  </FilePublisherRule>
  <FilePublisherRule Id="89d8a4d3-f9e3-423a-92ae-86e7333e2662" Name="MICROSOFT ONENOTE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONENOTE" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
    <Exceptions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONENOTE" BinaryName="ONENOTE.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
    </Exceptions>
  </FilePublisherRule>
  <FilePublisherRule Id="5a2138bd-8042-4ec5-95b4-f990666fbf61" Name="MICROSOFT OUTLOOK, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OUTLOOK" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
    <Exceptions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OUTLOOK" BinaryName="OUTLOOK.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
    </Exceptions>
  </FilePublisherRule>
  <FilePublisherRule Id="3fc5f9c5-f180-435b-838f-2960106a3860" Name="MICROSOFT ONEDRIVE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONEDRIVE" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
    <Exceptions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONEDRIVE" BinaryName="ONEDRIVE.EXE">
        <BinaryVersionRange LowSection="17.3.6386.0412" HighSection="*" />
      </FilePublisherCondition>
    </Exceptions>
  </FilePublisherRule>
  <FilePublisherRule Id="17d988ef-073e-4d92-b4bf-f477b2ecccb5" Name="MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
    <Exceptions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="LYNC.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="LYNC99.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="UCMAPI.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="OCPUBMGR.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="WINWORD.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="EXCEL.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="POWERPNT.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="MSOSYNC.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
    </Exceptions>
  </FilePublisherRule>
</RuleCollection>
</AppLockerPolicy>", "id": "a23470d1-1fb1-445f-9282-e4a7d10ff5b8", "@odata.type": " }, { "displayName": "Office-365-ProPlus-1708-Allowed.xml", "fileHash": "4107a857-0e0b-483f-8ff5-bb3ed095b434", "file": "<AppLockerPolicy Version="1">
  <RuleCollection Type="Exe" EnforcementMode="Enabled">
    <FilePublisherRule Id="d663276c-544e-4dea-b75c-75fc2d4e0266" Name="LYNC.EXE, version 16.0.7870.2020 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="LYNC.EXE">
		          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
	</FilePublisherRule>
    <FilePublisherRule Id="219571b4-a257-4b4c-b856-ebf0681ee0f0" Name="LYNC99.EXE, version 16.0.7870.2020 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="LYNC99.EXE">
          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="538d443a-9fdb-491e-8bc3-e78db9c310c7" Name="ONENOTEM.EXE, version 16.0.8201.2025 and above, in MICROSOFT ONENOTE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONENOTE" BinaryName="ONENOTEM.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="6ef07a92-f1db-4880-8b40-dd39b743a485" Name="WINWORD.EXE, version 16.0.8201.2025 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="WINWORD.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="7d74d1ad-a60b-4ea8-bb60-3d404886d10b" Name="ONENOTE.EXE, version 16.0.8201.2025 and above, in MICROSOFT ONENOTE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONENOTE" BinaryName="ONENOTE.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="8409aa62-1b52-484b-8787-d57cc8525e21" Name="OCPUBMGR.EXE, version 16.0.7870.2020 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="OCPUBMGR.EXE">
          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="e6ccccd1-a60f-4cb4-8b4b-903c70976b50" Name="POWERPNT.EXE, version 16.0.8201.2025 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="POWERPNT.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="ec79ebbe-3169-4a26-af5e-e076c9096495" Name="MSOSYNC.EXE, version 16.0.8201.2025 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="MSOSYNC.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="f0b3526b-14e7-4428-9703-4dff2ea4000d" Name="UCMAPI.EXE, version 16.0.7870.2020 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="UCMAPI.EXE">
          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="f1bedcb1-ca34-47b5-86c8-25654b178cb9" Name="OUTLOOK.EXE, version 16.0.8201.2025 and above, in MICROSOFT OUTLOOK, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OUTLOOK" BinaryName="OUTLOOK.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="f961e846-3fe7-464c-9508-035337d1e868" Name="EXCEL.EXE, version 16.0.8201.2025 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="EXCEL.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="d703319c-0c9e-4467-ad09-713307e30df6" Name="MICROSOFT OFFICE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="de9f3461-6856-405d-9624-a80ca701f6cb" Name="MICROSOFT OFFICE 2003, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2003" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="ade1b828-7055-47fc-99bc-432cf7d1209e" Name="2007 MICROSOFT OFFICE SYSTEM, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="2007 MICROSOFT OFFICE SYSTEM" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="bb3877b6-f1ad-4c83-96e2-d6bf75e33cbf" Name="MICROSOFT OFFICE 2010, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2010" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="23635eef-b1e3-4da2-8859-0638ec607b38" Name="MICROSOFT OFFICE 2013, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2013" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="d2d0520a-57de-4bd5-bcd9-b3d47221f87a" Name="MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
      <Exceptions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="EXCEL.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="LYNC.EXE">
          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="LYNC99.EXE">
          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="MSOSYNC.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="OCPUBMGR.EXE">
          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="POWERPNT.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="UCMAPI.EXE">
          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="WINWORD.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Exceptions>
    </FilePublisherRule>
    <FilePublisherRule Id="a3365dff-6052-41a8-82a6-34444ec25953" Name="MICROSOFT ONENOTE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONENOTE" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
      <Exceptions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONENOTE" BinaryName="ONENOTE.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONENOTE" BinaryName="ONENOTEM.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Exceptions>
    </FilePublisherRule>
    <FilePublisherRule Id="0ba4c150-1cb3-4cb9-ab02-265274419409" Name="MICROSOFT OUTLOOK, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OUTLOOK" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
      <Exceptions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OUTLOOK" BinaryName="OUTLOOK.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Exceptions>
    </FilePublisherRule>
    <FilePublisherRule Id="6714f85f-adda-4ec7-947c-7552f7d94625" Name="MICROSOFT CLIP ORGANIZER, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT CLIP ORGANIZER" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>	
    <FilePublisherRule Id="74ab368f-a147-4cf9-80c3-53fb669c4836" Name="MICROSOFT OFFICE INFOPATH, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE INFOPATH" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="9769d209-85f8-4389-bdc6-ddca30f1c671" Name="MICROSOFT OFFICE HELP VIEWER, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE HELP VIEWER" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
	</RuleCollection>
</AppLockerPolicy>", "id": "0c5c4541-87a8-478b-b9fc-4206d0f421f9", "@odata.type": " } ], "exemptAppLockerFiles": [], "enterpriseNetworkDomainNames": [], "enterpriseProxiedDomains": [ { "displayName": "SharePoint", "proxiedDomains": [ { "ipAddressOrFQDN": "$Sharepoint.sharepoint.com", "@odata.type": " }, { "ipAddressOrFQDN": "$Sharepoint-my.sharepoint.com", "@odata.type": " }, { "ipAddressOrFQDN": "$Sharepoint.sharepoint.com", "@odata.type": " } ], "@odata.type": " } ], "enterpriseIPRanges": [], "enterpriseIPRangesAreAuthoritative": false, "enterpriseProxyServers": [], "enterpriseInternalProxyServers": [], "enterpriseProxyServersAreAuthoritative": false, "neutralDomainResources": [], "windowsHelloForBusinessBlocked": false, "pinMinimumLength": 4, "pinUppercaseLetters": "notAllow", "pinLowercaseLetters": "notAllow", "pinSpecialCharacters": "notAllow", "pinExpirationDays": 0, "numberOfPastPinsRemembered": 0, "passwordMaximumAttemptCount": 0, "minutesOfInactivityBeforeDeviceLock": 0, "mdmEnrollmentUrl": "https://enrollment.manage.microsoft.com/enrollmentserver/discovery.svc", "@odata.type": " } "@ $ManagedAppPolicy_WIP_MDM = @" { "description": "", "displayName": "Win10 WIP MDM Policy - Assigned", "enforcementLevel": "encryptAuditAndPrompt", "enterpriseDomain": "$EnterpriseDomain", "enterpriseProtectedDomainNames": [], "protectionUnderLockConfigRequired": false, "dataRecoveryCertificate": null, "revokeOnUnenrollDisabled": false, "rightsManagementServicesTemplateId": null, "azureRightsManagementServicesAllowed": false, "iconsVisible": true, "protectedApps": [ { "@odata.type": " "description": "", "displayName": "Microsoft Teams", "productName": "*", "publisherName": "O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false, "binaryName": "teams.exe", "binaryVersionLow": "*", "binaryVersionHigh": "*" }, { "@odata.type": " "description": "", "displayName": "Microsoft Remote Desktop", "productName": "*", "publisherName": "O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false, "binaryName": "mstsc.exe", "binaryVersionLow": "*", "binaryVersionHigh": "*" }, { "@odata.type": " "description": "", "displayName": "Microsoft Paint", "productName": "*", "publisherName": "O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false, "binaryName": "mspaint.exe", "binaryVersionLow": "*", "binaryVersionHigh": "*" }, { "@odata.type": " "description": "", "displayName": "Notepad", "productName": "*", "publisherName": "O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false, "binaryName": "notepad.exe", "binaryVersionLow": "*", "binaryVersionHigh": "*" }, { "@odata.type": " "description": "", "displayName": "Microsoft OneDrive", "productName": "*", "publisherName": "O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false, "binaryName": "onedrive.exe", "binaryVersionLow": "*", "binaryVersionHigh": "*" }, { "@odata.type": " "description": "", "displayName": "IE11", "productName": "*", "publisherName": "O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false, "binaryName": "iexplore.exe", "binaryVersionLow": "*", "binaryVersionHigh": "*" }, { "@odata.type": " "description": "", "displayName": "Company Portal", "productName": "Microsoft.CompanyPortal", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Microsoft Messaging", "productName": "Microsoft.Messaging", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Microsoft Movies and TV", "productName": "Microsoft.ZuneVideo", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Groove Music", "productName": "Microsoft.ZuneMusic", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Microsoft Photos", "productName": "Microsoft.Windows.Photos", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Mail and Calendar for Windows 10", "productName": "microsoft.windowscommunicationsapps", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "OneNote", "productName": "Microsoft.Office.OneNote", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "PowerPoint Mobile", "productName": "Microsoft.Office.PowerPoint", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Excel Mobile", "productName": "Microsoft.Office.Excel", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Word Mobile", "productName": "Microsoft.Office.Word", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Microsoft People", "productName": "Microsoft.People", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false }, { "@odata.type": " "description": "", "displayName": "Microsoft Edge", "productName": "Microsoft.MicrosoftEdge", "publisherName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US", "denied": false } ], "exemptApps": [], "protectedAppLockerFiles": [ { "displayName": "Denied-Downlevel-Office-365-ProPlus.xml", "fileHash": "786d7f7d-0735-49b8-9293-7b3aaf68b68c", "file": "<AppLockerPolicy Version="1">
<RuleCollection Type="Exe" EnforcementMode="Enabled">
  <FilePublisherRule Id="b005eade-a5ee-4f5a-be45-d08fa557a4b2" Name="MICROSOFT OFFICE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
  </FilePublisherRule>
  <FilePublisherRule Id="de9f3461-6856-405d-9624-a80ca701f6cb" Name="MICROSOFT OFFICE 2003, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2003" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
  </FilePublisherRule>
  <FilePublisherRule Id="ade1b828-7055-47fc-99bc-432cf7d1209e" Name="2007 MICROSOFT OFFICE SYSTEM, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="2007 MICROSOFT OFFICE SYSTEM" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
  </FilePublisherRule>
  <FilePublisherRule Id="f6a075b5-a5b5-4654-abd6-731dacb40d95" Name="MICROSOFT OFFICE ONENOTE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE ONENOTE" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="12.0.9999.9999" />
      </FilePublisherCondition>
    </Conditions>
  </FilePublisherRule>
  <FilePublisherRule Id="0ec03b2f-e9a4-4743-ae60-6d29886cf6ae" Name="MICROSOFT OFFICE OUTLOOK, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE OUTLOOK" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="12.0.9999.9999" />
      </FilePublisherCondition>
    </Conditions>
  </FilePublisherRule>
  <FilePublisherRule Id="7b272efd-4105-4fb7-9d40-bfa597c6792a" Name="MICROSOFT OFFICE 2013, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2013" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
  </FilePublisherRule>
  <FilePublisherRule Id="89d8a4d3-f9e3-423a-92ae-86e7333e2662" Name="MICROSOFT ONENOTE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONENOTE" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
    <Exceptions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONENOTE" BinaryName="ONENOTE.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
    </Exceptions>
  </FilePublisherRule>
  <FilePublisherRule Id="5a2138bd-8042-4ec5-95b4-f990666fbf61" Name="MICROSOFT OUTLOOK, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OUTLOOK" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
    <Exceptions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OUTLOOK" BinaryName="OUTLOOK.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
    </Exceptions>
  </FilePublisherRule>
  <FilePublisherRule Id="3fc5f9c5-f180-435b-838f-2960106a3860" Name="MICROSOFT ONEDRIVE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONEDRIVE" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
    <Exceptions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONEDRIVE" BinaryName="ONEDRIVE.EXE">
        <BinaryVersionRange LowSection="17.3.6386.0412" HighSection="*" />
      </FilePublisherCondition>
    </Exceptions>
  </FilePublisherRule>
  <FilePublisherRule Id="17d988ef-073e-4d92-b4bf-f477b2ecccb5" Name="MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
    <Conditions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="*">
        <BinaryVersionRange LowSection="*" HighSection="*" />
      </FilePublisherCondition>
    </Conditions>
    <Exceptions>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="LYNC.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="LYNC99.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="UCMAPI.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="OCPUBMGR.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="WINWORD.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="EXCEL.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="POWERPNT.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
      <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="MSOSYNC.EXE">
        <BinaryVersionRange LowSection="16.0.7500.0000" HighSection="*" />
      </FilePublisherCondition>
    </Exceptions>
  </FilePublisherRule>
</RuleCollection>
</AppLockerPolicy>", "id": "95a3cc79-7306-4eac-8a1a-7daef9f083b3", "@odata.type": " }, { "displayName": "Office-365-ProPlus-1708-Allowed.xml", "fileHash": "2eb106c8-234b-4253-af44-63f522bfe222", "file": "<AppLockerPolicy Version="1">
  <RuleCollection Type="Exe" EnforcementMode="Enabled">
    <FilePublisherRule Id="d663276c-544e-4dea-b75c-75fc2d4e0266" Name="LYNC.EXE, version 16.0.7870.2020 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="LYNC.EXE">
		          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
	</FilePublisherRule>
    <FilePublisherRule Id="219571b4-a257-4b4c-b856-ebf0681ee0f0" Name="LYNC99.EXE, version 16.0.7870.2020 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="LYNC99.EXE">
          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="538d443a-9fdb-491e-8bc3-e78db9c310c7" Name="ONENOTEM.EXE, version 16.0.8201.2025 and above, in MICROSOFT ONENOTE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONENOTE" BinaryName="ONENOTEM.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="6ef07a92-f1db-4880-8b40-dd39b743a485" Name="WINWORD.EXE, version 16.0.8201.2025 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="WINWORD.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="7d74d1ad-a60b-4ea8-bb60-3d404886d10b" Name="ONENOTE.EXE, version 16.0.8201.2025 and above, in MICROSOFT ONENOTE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONENOTE" BinaryName="ONENOTE.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="8409aa62-1b52-484b-8787-d57cc8525e21" Name="OCPUBMGR.EXE, version 16.0.7870.2020 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="OCPUBMGR.EXE">
          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="e6ccccd1-a60f-4cb4-8b4b-903c70976b50" Name="POWERPNT.EXE, version 16.0.8201.2025 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="POWERPNT.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="ec79ebbe-3169-4a26-af5e-e076c9096495" Name="MSOSYNC.EXE, version 16.0.8201.2025 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="MSOSYNC.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="f0b3526b-14e7-4428-9703-4dff2ea4000d" Name="UCMAPI.EXE, version 16.0.7870.2020 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="UCMAPI.EXE">
          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="f1bedcb1-ca34-47b5-86c8-25654b178cb9" Name="OUTLOOK.EXE, version 16.0.8201.2025 and above, in MICROSOFT OUTLOOK, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OUTLOOK" BinaryName="OUTLOOK.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="f961e846-3fe7-464c-9508-035337d1e868" Name="EXCEL.EXE, version 16.0.8201.2025 and above, in MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Allow">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="EXCEL.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="d703319c-0c9e-4467-ad09-713307e30df6" Name="MICROSOFT OFFICE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="de9f3461-6856-405d-9624-a80ca701f6cb" Name="MICROSOFT OFFICE 2003, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2003" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="ade1b828-7055-47fc-99bc-432cf7d1209e" Name="2007 MICROSOFT OFFICE SYSTEM, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="2007 MICROSOFT OFFICE SYSTEM" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="bb3877b6-f1ad-4c83-96e2-d6bf75e33cbf" Name="MICROSOFT OFFICE 2010, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2010" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="23635eef-b1e3-4da2-8859-0638ec607b38" Name="MICROSOFT OFFICE 2013, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2013" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="d2d0520a-57de-4bd5-bcd9-b3d47221f87a" Name="MICROSOFT OFFICE 2016, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
      <Exceptions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="EXCEL.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="LYNC.EXE">
          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="LYNC99.EXE">
          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="MSOSYNC.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="OCPUBMGR.EXE">
          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="POWERPNT.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="UCMAPI.EXE">
          <BinaryVersionRange LowSection="16.0.7870.2020" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE 2016" BinaryName="WINWORD.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Exceptions>
    </FilePublisherRule>
    <FilePublisherRule Id="a3365dff-6052-41a8-82a6-34444ec25953" Name="MICROSOFT ONENOTE, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONENOTE" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
      <Exceptions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONENOTE" BinaryName="ONENOTE.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT ONENOTE" BinaryName="ONENOTEM.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Exceptions>
    </FilePublisherRule>
    <FilePublisherRule Id="0ba4c150-1cb3-4cb9-ab02-265274419409" Name="MICROSOFT OUTLOOK, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OUTLOOK" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
      <Exceptions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OUTLOOK" BinaryName="OUTLOOK.EXE">
          <BinaryVersionRange LowSection="16.0.8201.2025" HighSection="*" />
        </FilePublisherCondition>
      </Exceptions>
    </FilePublisherRule>
    <FilePublisherRule Id="6714f85f-adda-4ec7-947c-7552f7d94625" Name="MICROSOFT CLIP ORGANIZER, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT CLIP ORGANIZER" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>	
    <FilePublisherRule Id="74ab368f-a147-4cf9-80c3-53fb669c4836" Name="MICROSOFT OFFICE INFOPATH, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE INFOPATH" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
    <FilePublisherRule Id="9769d209-85f8-4389-bdc6-ddca30f1c671" Name="MICROSOFT OFFICE HELP VIEWER, from O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" Description="" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US" ProductName="MICROSOFT OFFICE HELP VIEWER" BinaryName="*">
          <BinaryVersionRange LowSection="*" HighSection="*" />
        </FilePublisherCondition>
      </Conditions>
    </FilePublisherRule>
	</RuleCollection>
</AppLockerPolicy>", "id": "4e49ffae-f006-46b9-b74d-785565f7efb4", "@odata.type": " } ], "exemptAppLockerFiles": [], "enterpriseNetworkDomainNames": [], "enterpriseProxiedDomains": [ { "displayName": "SharePoint", "proxiedDomains": [ { "ipAddressOrFQDN": "$Sharepoint.sharepoint.com", "@odata.type": " }, { "ipAddressOrFQDN": "$Sharepoint-my.sharepoint.com", "@odata.type": " }, { "ipAddressOrFQDN": "$Sharepoint.sharepoint.com", "@odata.type": " } ], "@odata.type": " } ], "enterpriseIPRanges": [], "enterpriseIPRangesAreAuthoritative": false, "enterpriseProxyServers": [], "enterpriseInternalProxyServers": [], "enterpriseProxyServersAreAuthoritative": false, "neutralDomainResources": [], "@odata.type": " } "@ Write-Host "Adding Windows Information Protection Without Enrollment Policy from JSON..." -ForegroundColor Yellow $CreateResult = Add-WindowsInformationProtectionPolicy -JSON $ManagedAppPolicy_WIP write-host "Policy created with id" $CreateResult.id $WIP_PolicyID = $CreateResult.id $Assign_Policy = Assign-WindowsInformationProtectionPolicy -Id $WIP_PolicyID -TargetGroupId $TargetGroupId Write-Host "Assigned '$AADGroup' to $($CreateResult.displayName)/$($CreateResult.id)" Write-Host Write-Host "Adding Windows Information Protection MDM Policy from JSON..." -ForegroundColor Yellow $CreateResult = Add-MDMWindowsInformationProtectionPolicy -JSON $ManagedAppPolicy_WIP_MDM write-host "Policy created with id" $CreateResult.id $WIP_PolicyID = $CreateResult.id $Assign_Policy = Assign-MDMWindowsInformationProtectionPolicy -Id $WIP_PolicyID -TargetGroupId $TargetGroupId Write-Host "Assigned '$AADGroup' to $($CreateResult.displayName)/$($CreateResult.id)" Write-Host
combined_dataset/train/non-malicious/Get-StatType proxy.ps1
Get-StatType proxy.ps1
# get-mystattype.ps1 : Proxy cmdlet for the Get-StatType cmdlet. # The scripts add the parameter -ShowInstances to the cmdlet # Parameters: # ShowInstances : switch to define if all the instances for each metric will be shown # Author: LucD # History: # v1.0 27/08/09 first version # [CmdletBinding()] param( [Parameter(Position=0)] [ValidateNotNullOrEmpty()] [System.String[]] ${Name}, [Parameter(Mandatory=$true, Position=1, ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] [VMware.VimAutomation.Types.InventoryItem[]] ${Entity}, [System.DateTime] ${Start}, [System.DateTime] ${Finish}, [ValidateNotNullOrEmpty()] [VMware.VimAutomation.Types.StatInterval[]] ${Interval}, [ValidateNotNullOrEmpty()] [VMware.VimAutomation.Types.VIServer[]] ${Server}, [switch] ${ShowInstances}) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand('Get-StatType', [System.Management.Automation.CommandTypes]::Cmdlet) if ($ShowInstances) { $perfMgr = Get-View (Get-View ServiceInstance).content.perfManager $PCLookup = @{} $perfMgr.PerfCounter | %{$PCLookup[$_.GroupInfo.Key + "." + $_.NameInfo.Key + "." + $_.RollupType]=$_.Key} $InstLookup = @{} $perfMgr.QueryAvailablePerfMetric(($entity | Get-View).MoRef,$null,$null,$null) | %{ if($_.Instance -eq ""){ $InstLookup[$_.CounterId] += @('""') } else{ $InstLookup[$_.CounterId] += @($_.Instance) } } [Void]$PSBoundParameters.Remove("ShowInstances") $scriptCmd = {& $wrappedCmd @PSBoundParameters | %{ if($InstLookup.ContainsKey($PCLookup[$_])){ $t = New-Object PSObject $t | Add-Member -MemberType NoteProperty -Name Metric -Value $_ $t | Add-Member -MemberType NoteProperty -Name Instances -Value ($InstLookup[$PCLookup[$_]]) # Output the new object $t # Get rid of metric so identical return values from original Get-StatType wont produce output $InstLookup.Remove($PCLookup[$_]) } }} } else{ $scriptCmd = {& $wrappedCmd @PSBoundParameters } } $steppablePipeline = $scriptCmd.GetSteppablePipeline($myInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { Throw } } end { try { $steppablePipeline.End() } catch { throw } }
combined_dataset/train/non-malicious/1144.ps1
1144.ps1
function Start-TestFixture { & (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve) } function Test-ShouldGetCallStores { foreach( $location in ([enum]::GetValues('Security.Cryptography.X509Certificates.StoreLocation')) ) { foreach( $name in ([Enum]::GetValues('Security.Cryptography.X509Certificates.StoreName')) ) { Write-Verbose ('Location: {0}; Name: {1}' -f $location,$name) [Security.Cryptography.X509Certificates.X509Store]$store = Get-CertificateStore -StoreLocation $location -StoreName $name Assert-NotNull $store $actual = $store.Name if( $actual -eq 'CA' ) { $actual = 'CertificateAuthority' } Assert-Equal $location $store.Location Assert-Equal $name $actual } } } function Test-ShouldCreateStore { $store = Get-CertificateStore -StoreLocation CurrentUser -CustomStoreName 'fubar' Assert-NotNull $store Assert-Equal 0 $store.Certificates.Count Assert-Equal 'fubar' $store.Name }
combined_dataset/train/non-malicious/Lot buttons at one time.ps1
Lot buttons at one time.ps1
$frmMain_Load= { for ($i = 0; $i -lt 2; $i++) { for ($j = 0; $j -lt 5; $j++) { $num[$i, $j] = $i * 5 + $j + 1 $btn[$i, $j] = New-Object Windows.Forms.Button # #btnX # $btn[$i, $j].Font = New-Object Drawing.Font("Tahoma", 14, [Drawing.FontStyle]::Bold) $btn[$i, $j].Left = $j * 50 + 10 $btn[$i, $j].Parent = $frmMain $btn[$i, $j].Size = New-Object Drawing.Size(50, 50) $btn[$i, $j].Text = $(if ($num[$i, $j] -eq 10) {'0'} else {$num[$i, $j]}) $btn[$i, $j].Top = $i * 50 + 5 }#for }#for } function frmMain_Show { Add-Type -AssemblyName System.Windows.Forms [Windows.Forms.Application]::EnableVisualStyles() $btn = New-Object "Windows.Forms.Button[,]" 2, 5 $num = New-Object "int32[,]" 2, 5 $frmMain = New-Object Windows.Forms.Form # #frmMain # $frmMain.ClientSize = New-Object Drawing.Size(270, 110) $frmMain.FormBorderStyle = "FixedSingle" $frmMain.MaximizeBox = $false $frmMain.StartPosition = "CenterScreen" $frmMain.Text = "Form1" $frmMain.Add_Load($frmMain_Load) [void]$frmMain.ShowDialog() } frmMain_Show
combined_dataset/train/non-malicious/Deploy VM with Static IP_1.ps1
Deploy VM with Static IP_1.ps1
# 1. Create a simple customizations spec: $custSpec = New-OSCustomizationSpec -Type NonPersistent -OSType Windows ` -OrgName “My Organization” -FullName “MyVM” -Domain “MyDomain” ` –DomainAdminUsername “user” –DomainAdminPassword “password” # 2. Modify the default network customization settings: $custSpec | Get-OSCustomizationNicMapping | Set-OSCustomizationNicMapping ` -IpMode UseStaticIP -IpAddress 192.168.121.228 -SubnetMask 255.255.248.0 ` -Dns 192.168.108.1 -DefaultGateway 192.168.108.1 # 3. Deploy a VM from a template using the newly created customization: New-VM -Name “MyNewVM” -Template $template -VMHost $vmHost ` -OSCustomizationSpec $custSpec
combined_dataset/train/non-malicious/sample_23_69.ps1
sample_23_69.ps1
袧邪褋褌褉邪懈胁邪械屑褘泄 懈 懈褋锌芯谢薪褟械屑褘泄 HTTP-蟹邪锌褉芯褋 泻 褋械褉胁械褉褍. 袩褉懈 褉邪斜芯褌械 褋 URL-邪写褉械褋芯屑 褋褍褖械褋褌胁褍褞褌 锌芯写写械褉卸懈胁邪械屑褘械 懈 蟹邪锌褉械褖械薪薪褘械 褋懈屑胁芯谢褘. 袙褋械 薪械锌芯写写械褉卸懈胁邪械屑褘械 褋懈屑胁芯谢褘 写芯谢卸薪褘 斜褘褌褜 锌褉芯褑械薪褌-泻芯写懈褉芯胁邪薪褘. 袩褉懈 褝褌芯屑, 锌芯写写械褉卸懈胁邪械屑褘械 褋懈屑胁芯谢褘 (蟹邪褉械蟹械褉胁懈褉芯胁邪薪薪褘械 褋懈屑胁芯谢褘, 褉邪蟹写械谢懈褌械谢懈 褋械谐屑械薪褌芯胁 邪写褉械褋邪, 褉邪蟹写械谢懈褌械谢懈 胁薪褍褌褉懈 褋械谐屑械薪褌芯胁 懈 褌.写.) 屑芯谐褍褌 斜褘褌褜 锌褉械写褋褌邪胁谢械薪褘 泻邪泻 胁 薪邪褌褍褉邪谢褜薪芯屑, 褌邪泻 懈 锌褉芯褑械薪褌-泻芯写懈褉芯胁邪薪薪芯屑 胁懈写械. 袙芯 胁褏芯写褟褖械泄 褋褌褉芯泻械 袟邪锌褉芯褋Http 褋芯褏褉邪薪褟褞褌褋褟 锌褉芯褑械薪褌-泻芯写懈褉芯胁邪薪薪褘械 锌褉械写褋褌邪胁谢械薪懈褟 褋懈屑胁芯谢芯胁, 薪械写芯锌褍褋褌懈屑褘械 褋懈屑胁芯谢褘 斜褍写褍褌 蟹邪屑械薪械薪褘. 袛芯锌褍褋褌懈屑褘屑懈 褟胁谢褟褞褌褋褟 胁褋械 褉邪蟹写械谢懈褌械谢懈 胁薪褍褌褉懈 褋械谐屑械薪褌芯胁, 泻芯褌芯褉褘械 褍泻邪蟹邪薪褘 胁 褋褌邪薪写邪褉褌械 RFC 3986: "!", "&", "'", "+", "*", "$", "(", ")", ",", ";", "=". 孝邪泻卸械 写谢褟 褋械谐屑械薪褌芯胁 蟹邪锌褉芯褋 懈 褎褉邪谐屑械薪褌 写芯锌褍褋褌懈屑褘 "/", "?". 小懈屑胁芯谢褘, 泻芯褌芯褉褘械 褟胁谢褟褞褌褋褟 褉邪蟹写械谢懈褌械谢褟屑懈 褋械谐屑械薪褌芯胁, 薪械 屑械薪褟褞褌褋褟 ":", "/", "?", "#", "[", "]", "@". 袧械 屑械薪褟褞褌褋褟 褉邪蟹褉械褕械薪薪褘械 泻 懈褋锌芯谢褜蟹芯胁邪薪懈褞 胁芯 胁褋械褏 褔邪褋褌褟褏 url-邪写褉械褋邪 褋懈屑胁芯谢褘: "-", ".", "_", "~". 袝褋谢懈 胁芯 胁褏芯写褟褖械泄 褋褌褉芯泻械 锌褉械写褋褌邪胁谢械薪褘 褋懈屑胁芯谢褘 薪邪褑懈芯薪邪谢褜薪褘褏 邪谢褎邪胁懈褌芯胁, 褌芯 芯薪懈 褌邪泻卸械 泻芯写懈褉褍褞褌褋褟. 袝褋谢懈 褌邪泻懈械 褋懈屑胁芯谢褘 懈写褍褌 胁 写芯屑械薪薪芯泄 褔邪褋褌懈 褋褌褉芯泻懈, 褌芯 锌褉芯懈褋褏芯写懈褌 IDN 泻芯写懈褉芯胁邪薪懈械. 袝褋谢懈 胁 写褉褍谐懈褏 褔邪褋褌褟褏 url - 锌褉芯褑械薪褌薪芯械-泻芯写懈褉芯胁邪薪懈械 褋懈屑胁芯谢芯胁. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袩褉懈屑械褉褘:** 袗褍褌械薪褌懈褎懈泻邪褑懈褟 锌芯 锌芯谢褜蟹芯胁邪褌械谢褞 懈 锌邪褉芯谢褞 ```xbsl 蟹薪褔 袗褍褌械薪褌懈褎懈泻邪褑懈褟 = 薪芯胁褘泄 袗褍褌械薪褌懈褎懈泻邪褑懈褟Http("锌芯谢褜蟹芯胁邪褌械谢褜", "锌邪褉芯谢褜") 蟹薪褔 袟邪锌褉芯褋 = 袣谢懈械薪褌Http.袟邪锌褉芯褋Get("http://邪写褉械褋") 懈褋锌 袨褌胁械褌 = 袟邪锌褉芯褋.校褋褌邪薪芯胁懈褌褜袗褍褌械薪褌懈褎懈泻邪褑懈褞(袗褍褌械薪褌懈褎懈泻邪褑懈褟).袙褘锌芯谢薪懈褌褜() ``` 袟邪锌褉芯褋 泻褍褉褋邪 胁邪谢褞褌: ```xbsl // 褎芯褉屑懈褉芯胁邪薪懈械 蟹邪锌褉芯褋邪 'https://free.currconv.com/api/v7/convert?apiKey=YOUR_API_KEY&compact=ultra&q=USD_RUB&q=EUR_RUB' 蟹薪褔 袣袥挟效_袗袩袠 = "YOUR_API_KEY" 蟹薪褔 袟邪锌褉芯褋 = 袣谢懈械薪褌Http.袟邪锌褉芯褋Get("https://free.currconv.com/api/v7/convert") .袛芯斜邪胁懈褌褜袩邪褉邪屑械褌褉袟邪锌褉芯褋邪("apiKey", 袣袥挟效_袗袩袠) .袛芯斜邪胁懈褌褜袩邪褉邪屑械褌褉袟邪锌褉芯褋邪("compact", ultra) .袛芯斜邪胁懈褌褜袩邪褉邪屑械褌褉袟邪锌褉芯褋邪("q", ["USD_RUB", "EUR_RUB"]) 懈褋锌 袨褌胁械褌 = 袟邪锌褉芯褋.袙褘锌芯谢薪懈褌褜() ``` 袟邪锌褉芯褋 胁 Google c 蟹邪屑械薪芯泄 锌邪褉邪屑械褌褉邪: ```xbsl 蟹薪褔 袘邪蟹芯胁褘泄袗写褉械褋 = "https://google.ru?q=褕邪斜谢芯薪" 蟹薪褔 袟薪邪褔械薪懈械袩芯懈褋泻邪 = "1小:袩褉械写锌褉懈褟褌懈械. 协谢械屑械薪褌" 蟹薪褔 袟邪锌褉芯褋 = 袣谢懈械薪褌Http.袟邪锌褉芯褋Get(袘邪蟹芯胁褘泄袗写褉械褋) .校褋褌邪薪芯胁懈褌褜袩邪褉邪屑械褌褉袟邪锌褉芯褋邪("q", 袟薪邪褔械薪懈械袩芯懈褋泻邪) 懈褋锌 袨褌胁械褌 = 袟邪锌褉芯褋.袙褘锌芯谢薪懈褌褜() ``` **小褉邪胁薪械薪懈械:** 小褉邪胁薪械薪懈械 褋褋褘谢芯褔薪芯械 # HttpRequest#AbsoluteUrl 袛械泻芯写懈褉芯胁邪薪薪褘泄 URL-邪写褉械褋, 泻 泻芯褌芯褉芯屑褍 斜褍写械褌 胁褘锌芯谢薪褟褌褜褋褟 蟹邪锌褉芯褋. 袛邪卸械 械褋谢懈 胁 蟹邪锌褉芯褋械 斜褘谢 褍泻邪蟹邪薪 芯褌薪芯褋懈褌械谢褜薪褘泄 锌褍褌褜, 褝褌芯 褋胁芯泄褋褌胁芯 斜褍写械褌 褋芯写械褉卸邪褌褜 邪斜褋芯谢褞褌薪褘泄 锌褍褌褜 泻 蟹邪锌褉芯褕械薪薪芯屑褍 褉械褋褍褉褋褍. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **孝芯谢褜泻芯效褌械薪懈械** **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#Authentication 袛邪薪薪褘械 邪褍褌械薪褌懈褎懈泻邪褑懈懈 锌褉懈 胁褘锌芯谢薪械薪懈懈 褝褌芯谐芯 蟹邪锌褉芯褋邪. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **孝芯谢褜泻芯效褌械薪懈械** **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#ConnectionTimeout 孝邪泄屑邪褍褌 褋芯械写懈薪械薪懈褟 褋 褋械褉胁械褉芯屑. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **孝芯谢褜泻芯效褌械薪懈械** **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#Headers 袟邪谐芯谢芯胁泻懈 蟹邪锌褉芯褋邪. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#HttpMethod 袙芯蟹胁褉邪褖邪械褌 HTTP-屑械褌芯写 蟹邪锌褉芯褋邪. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **孝芯谢褜泻芯效褌械薪懈械** **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#MaxRedirects 袦邪泻褋懈屑邪谢褜薪芯械 泻芯谢懈褔械褋褌胁芯 锌械褉械褏芯写芯胁. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **孝芯谢褜泻芯效褌械薪懈械** **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#Proxy 袧邪褋褌褉芯泄泻懈 锌褉芯泻褋懈-褋械褉胁械褉邪, 泻芯褌芯褉褘械 斜褍写褍褌 懈褋锌芯谢褜蟹芯胁邪薪褘 锌褉懈 胁褘锌芯谢薪械薪懈懈 写邪薪薪芯谐芯 蟹邪锌褉芯褋邪. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **孝芯谢褜泻芯效褌械薪懈械** **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#QueryOptions 袩邪褉邪屑械褌褉褘 蟹邪锌褉芯褋邪. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#RequestTimeout 孝邪泄屑邪褍褌 写谢褟 蟹邪锌褉芯褋芯胁. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **孝芯谢褜泻芯效褌械薪懈械** **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#AddHeader(String,Number|String|ReadableArray<Number|String>) 袛芯斜邪胁谢褟械褌 薪芯胁褘泄 蟹邪谐芯谢芯胁芯泻 `袟邪谐芯谢芯胁芯泻` 褋芯 蟹薪邪褔械薪懈械屑 `袟薪邪褔械薪懈械`. 袟邪锌褉械褖械薪芯 褍褋褌邪薪邪胁谢懈胁邪褌褜 蟹邪谐芯谢芯胁泻懈 "Content-Length" 懈 "Transfer-Encoding". 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#AddHeaders(ReadableHttpHeaders) 袛芯斜邪胁谢褟械褌 胁褋械 蟹邪谐芯谢芯胁泻懈 懈蟹 蟹邪写邪薪薪芯泄 泻芯谢谢械泻褑懈懈 蟹邪谐芯谢芯胁泻芯胁 `袟邪谐芯谢芯胁泻懈`. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#AddQueryOption(String,String|Iterable<String>) 袛芯斜邪胁谢褟械褌 `袟薪邪褔械薪懈械` 写谢褟 锌邪褉邪屑械褌褉邪 `袠屑褟袩邪褉邪屑械褌褉邪`. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉 `袟邪锌褉芯褋Http`. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#AddQueryOptions(UrlParameters) 袛芯斜邪胁谢褟械褌 胁褋械 锌邪褉邪屑械褌褉褘 蟹邪锌褉芯褋邪 懈蟹 `袩邪褉邪屑械褌褉褘袟邪锌褉芯褋邪`. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉 `袟邪锌褉芯褋Http`. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#ClearHeaders() 校写邪谢褟械褌 胁褋械 蟹邪谐芯谢芯胁泻懈. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#ClearQueryOptions() 袨褔懈褖邪械褌 锌邪褉邪屑械褌褉褘 蟹邪锌褉芯褋邪. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉 `袟邪锌褉芯褋Http`. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#Execute(HttpContext?) 袙褘锌芯谢薪褟械褌 HTTP-蟹邪锌褉芯褋 褋 泻芯薪褌械泻褋褌芯屑 `袣芯薪褌械泻褋褌` 懈 胁芯蟹胁褉邪褖邪械褌 芯褌胁械褌. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#RemoveHeader(String) 校写邪谢褟械褌 蟹邪谐芯谢芯胁芯泻 褋 懈屑械薪械屑 `袟邪谐芯谢芯胁芯泻` (械褋谢懈 械褋褌褜). 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#RemoveQueryOption(String) 校写邪谢褟械褌 胁褋械 蟹薪邪褔械薪懈褟 锌邪褉邪屑械褌褉邪 `袠屑褟袩邪褉邪屑械褌褉邪` 懈蟹 锌邪褉邪屑械褌褉芯胁 蟹邪锌褉芯褋邪. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉 `袟邪锌褉芯褋Http`. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#SetAuthentication(HttpAuthentication?) 校褋褌邪薪邪胁谢懈胁邪械褌 写邪薪薪褘械 邪褍褌械薪褌懈褎懈泻邪褑懈懈 锌褉懈 胁褘锌芯谢薪械薪懈懈 褝褌芯谐芯 蟹邪锌褉芯褋邪. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#SetBody(String) 校褋褌邪薪邪胁谢懈胁邪械褌 褌械谢芯 蟹邪锌褉芯褋邪 懈蟹 褋褌褉芯泻懈 `孝械谢芯`. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** **袩械褉械谐褉褍蟹泻邪:** 校褋褌邪薪芯胁懈褌褜孝械谢芯(肖邪泄谢: **肖邪泄谢**): **袟邪锌褉芯褋Http**, 校褋褌邪薪芯胁懈褌褜孝械谢芯(袩芯褌芯泻: **袩芯褌芯泻效褌械薪懈褟**): **袟邪锌褉芯褋Http**, 校褋褌邪薪芯胁懈褌褜孝械谢芯(袩芯褌芯泻: **袩芯褌芯泻效褌械薪懈褟**, 袪邪蟹屑械褉: **袪邪蟹屑械褉袘邪泄褌芯胁**|**效懈褋谢芯**): **袟邪锌褉芯褋Http** # HttpRequest#SetBody(File) 校褋褌邪薪邪胁谢懈胁邪械褌 褌械谢芯 蟹邪锌褉芯褋邪 懈蟹 褎邪泄谢邪 `肖邪泄谢`. 袧械锌芯褋褉械写褋褌胁械薪薪芯 褔褌械薪懈械 懈蟹 褎邪泄谢邪 胁褘锌芯谢薪褟械褌褋褟 胁 屑芯屑械薪褌 胁褘锌芯谢薪械薪懈褟 蟹邪锌褉芯褋邪. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** **袩械褉械谐褉褍蟹泻邪:** 校褋褌邪薪芯胁懈褌褜孝械谢芯(孝械谢芯: **小褌褉芯泻邪**): **袟邪锌褉芯褋Http**, 校褋褌邪薪芯胁懈褌褜孝械谢芯(袩芯褌芯泻: **袩芯褌芯泻效褌械薪懈褟**): **袟邪锌褉芯褋Http**, 校褋褌邪薪芯胁懈褌褜孝械谢芯(袩芯褌芯泻: **袩芯褌芯泻效褌械薪懈褟**, 袪邪蟹屑械褉: **袪邪蟹屑械褉袘邪泄褌芯胁**|**效懈褋谢芯**): **袟邪锌褉芯褋Http** # HttpRequest#SetBody(ReadableStream) 校褋褌邪薪邪胁谢懈胁邪械褌 褌械谢芯 蟹邪锌褉芯褋邪 懈蟹 锌芯褌芯泻邪 `袩芯褌芯泻`. 袟邪锌褉芯褋 斜褍写械褌 胁褘锌芯谢薪械薪 褋 懈褋锌芯谢褜蟹芯胁邪薪懈械屑 屑械褏邪薪懈蟹屑邪 Chunked transfer encoding. 袧械锌芯褋褉械写褋褌胁械薪薪芯 褔褌械薪懈械 懈蟹 锌芯褌芯泻邪 胁褘锌芯谢薪褟械褌褋褟 胁 屑芯屑械薪褌 胁褘锌芯谢薪械薪懈褟 蟹邪锌褉芯褋邪. 袩芯褋谢械 胁褘锌芯谢薪械薪懈褟 蟹邪锌褉芯褋邪 锌芯褌芯泻 斜褍写械褌 蟹邪泻褉褘褌. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** **袩械褉械谐褉褍蟹泻邪:** 校褋褌邪薪芯胁懈褌褜孝械谢芯(孝械谢芯: **小褌褉芯泻邪**): **袟邪锌褉芯褋Http**, 校褋褌邪薪芯胁懈褌褜孝械谢芯(肖邪泄谢: **肖邪泄谢**): **袟邪锌褉芯褋Http**, 校褋褌邪薪芯胁懈褌褜孝械谢芯(袩芯褌芯泻: **袩芯褌芯泻效褌械薪懈褟**, 袪邪蟹屑械褉: **袪邪蟹屑械褉袘邪泄褌芯胁**|**效懈褋谢芯**): **袟邪锌褉芯褋Http** # HttpRequest#SetBody(ReadableStream,ByteSize|Number) 校褋褌邪薪邪胁谢懈胁邪械褌 褌械谢芯 蟹邪锌褉芯褋邪 懈蟹 锌芯褌芯泻邪 `袩芯褌芯泻` 褍泻邪蟹邪薪薪芯谐芯 褉邪蟹屑械褉邪 `袪邪蟹屑械褉`. 袧械锌芯褋褉械写褋褌胁械薪薪芯 褔褌械薪懈械 懈蟹 锌芯褌芯泻邪 胁褘锌芯谢薪褟械褌褋褟 胁 屑芯屑械薪褌 胁褘锌芯谢薪械薪懈褟 蟹邪锌褉芯褋邪. 袩芯褋谢械 胁褘锌芯谢薪械薪懈褟 蟹邪锌褉芯褋邪 锌芯褌芯泻 斜褍写械褌 蟹邪泻褉褘褌. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** **袩械褉械谐褉褍蟹泻邪:** 校褋褌邪薪芯胁懈褌褜孝械谢芯(孝械谢芯: **小褌褉芯泻邪**): **袟邪锌褉芯褋Http**, 校褋褌邪薪芯胁懈褌褜孝械谢芯(肖邪泄谢: **肖邪泄谢**): **袟邪锌褉芯褋Http**, 校褋褌邪薪芯胁懈褌褜孝械谢芯(袩芯褌芯泻: **袩芯褌芯泻效褌械薪懈褟**): **袟邪锌褉芯褋Http** # HttpRequest#SetConnectionTimeout(Duration) 校褋褌邪薪邪胁谢懈胁邪械褌 胁褉械屑褟 芯卸懈写邪薪懈褟 `孝邪泄屑邪褍褌` 褍褋褌邪薪芯胁泻懈 褋芯械写懈薪械薪懈褟 写谢褟 褝褌芯谐芯 蟹邪锌褉芯褋邪. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#SetContentType(String) 校褋褌邪薪邪胁谢懈胁邪械褌 蟹薪邪褔械薪懈械 `孝懈锌小芯写械褉卸懈屑芯谐芯` 蟹邪谐芯谢芯胁泻邪 "Content-Type". 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#SetCookies(String) 校褋褌邪薪邪胁谢懈胁邪械褌 蟹薪邪褔械薪懈械 `Cookies` 蟹邪谐芯谢芯胁泻邪 "Cookies". 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#SetHeader(String,Number|String|ReadableArray<Number|String>) 校褋褌邪薪邪胁谢懈胁邪械褌 蟹薪邪褔械薪懈械 `袟薪邪褔械薪懈械` 蟹邪谐芯谢芯胁泻邪 `袟邪谐芯谢芯胁芯泻`. 袟邪锌褉械褖械薪芯 褍褋褌邪薪邪胁谢懈胁邪褌褜 蟹邪谐芯谢芯胁泻懈 "Content-Length" 懈 "Transfer-Encoding". 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#SetHeaders(ReadableHttpHeaders) 袨褔懈褖邪械褌 蟹邪谐芯谢芯胁泻懈 懈 泻芯锌懈褉褍械褌 胁褋械 蟹邪谐芯谢芯胁泻懈 懈蟹 蟹邪写邪薪薪芯泄 泻芯谢谢械泻褑懈懈 `袟邪谐芯谢芯胁泻懈`. 袟邪锌褉械褖械薪芯 褍褋褌邪薪邪胁谢懈胁邪褌褜 蟹邪谐芯谢芯胁泻懈 "Content-Length" 懈 "Transfer-Encoding". 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#SetMaxRedirect(Number) 校褋褌邪薪邪胁谢懈胁邪械褌 屑邪泻褋懈屑邪谢褜薪芯械 泻芯谢懈褔械褋褌胁芯 锌械褉械薪邪锌褉邪胁谢械薪懈泄 `袣芯谢懈褔械褋褌胁芯`. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#SetProxy(InternetProxy?) 校褋褌邪薪邪胁谢懈胁邪械褌 薪邪褋褌褉芯泄泻懈 锌褉芯泻褋懈-褋械褉胁械褉邪 `袩褉芯泻褋懈`, 泻芯褌芯褉褘械 斜褍写褍褌 懈褋锌芯谢褜蟹芯胁邪薪褘 锌褉懈 胁褘锌芯谢薪械薪懈懈 写邪薪薪芯谐芯 蟹邪锌褉芯褋邪. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#SetQueryOption(String,String|Iterable<String>) 校褋褌邪薪邪胁谢懈胁邪械褌 `袟薪邪褔械薪懈械` 写谢褟 锌邪褉邪屑械褌褉邪 `袠屑褟袩邪褉邪屑械褌褉邪`. 袝褋谢懈 蟹薪邪褔械薪懈褟 锌邪褉邪屑械褌褉邪 褍卸械 斜褘谢懈 褍褋褌邪薪芯胁谢械薪褘, 褌芯 芯薪懈 斜褍写褍褌 蟹邪屑械薪械薪褘. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉 `袟邪锌褉芯褋Http`. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#SetQueryOptions(UrlParameters) 袨褔懈褖邪械褌 褍褋褌邪薪芯胁谢械薪薪褘械 锌邪褉邪屑械褌褉褘 蟹邪锌褉芯褋邪 懈 泻芯锌懈褉褍械褌 胁褋械 锌邪褉邪屑械褌褉褘 蟹邪锌褉芯褋邪 懈蟹 `袩邪褉邪屑械褌褉褘袟邪锌褉芯褋邪`. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉 `袟邪锌褉芯褋Http`. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#SetRequestTimeout(Duration) 校褋褌邪薪邪胁谢懈胁邪械褌 蟹薪邪褔械薪懈械 褌邪泄屑邪褍褌邪 `孝邪泄屑邪褍褌` 胁褘锌芯谢薪械薪懈褟 褝褌芯谐芯 蟹邪锌褉芯褋邪. 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http** # HttpRequest#SetUserAgent(String) 校褋褌邪薪邪胁谢懈胁邪械褌 蟹薪邪褔械薪懈械 `UserAgent` 蟹邪谐芯谢芯胁泻邪 "UserAgent". 袙芯蟹胁褉邪褖邪械褌 褌械泻褍褖懈泄 褝泻蟹械屑锌谢褟褉. -------------------- **袙懈写懈屑芯褋褌褜:** @袚谢芯斜邪谢褜薪芯 **袨锌褉械写械谢械薪:** **袟邪锌褉芯褋Http**
combined_dataset/train/non-malicious/sample_42_81.ps1
sample_42_81.ps1
param ( [Parameter(Mandatory = $true)] [string] $CertificateStoreLocation, [Parameter(Mandatory = $true)] [string] $CertificatePfxFullPath, [Parameter(Mandatory = $true)] [string] $CertificateExportPfxPassword ) # Import Certificate try { $CertificateExportPfxPasswordSecureString = $CertificateExportPfxPassword | ConvertTo-SecureString -AsPlainText -Force $importParams = @{ CertStoreLocation = $CertificateStoreLocation Password = $CertificateExportPfxPasswordSecureString FilePath = $CertificatePfxFullPath ErrorAction = 'Stop' } Import-PfxCertificate -Exportable @importParams | Write-Verbose } catch { $ErrorMessage = $_.Exception.Message throw [System.AccessViolationException] "An error occurred when importing Certificate on the developer machine [CertificateStoreLocation: $CertificateStoreLocation, CertificatePfxFullPath: $CertificatePfxFullPath]. Error: $($ErrorMessage)" } # Reference documentation - https://dev.to/iamthecarisma/managing-windows-pfx-certificates-through-powershell-3pj
combined_dataset/train/non-malicious/sample_7_79.ps1
sample_7_79.ps1
#************************************************ # TS_ClusterCAUWMINamespaceCheck.ps1 # Version 1.0.1 # Date: 1/16/2013 # Author: v-kaw # Description: [Idea ID 6519] [Windows] Invalid Class error on 2012 Clusters (SDP) # Rule number: 6519 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=6519 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 6519 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_ClusterCAUWMINamespaceCheck" $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function IsCluster #Check if this machine is cluster. { $ClusterKeyName = "HKLM:\Cluster" if (Test-Path -Path $ClusterKeyName) { return $true } else { return $false } } Function AppliesToSystem { #Add your logic here to specify on which environments this rule will appy return (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2) -and (IsCluster) ) #win8 } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ if($_.Exception.ErrorCode -ne $null) { $Script:ErrorCode = "0X{0:X}" -f $_.Exception.ErrorCode } elseif ($_.Exception.HResult -ne $null) { $Script:ErrorCode = "0X{0:X}" -f $_.Exception.HResult } elseif (($_.Exception -eq $null) -and ($_.HResult -ne $null)) { $Script:ErrorCode = "0X{0:X}" -f $_.HResult } if ($_.Exception.Message -ne $null) { $Script:ErrorMessage = $_.Exception.Message } elseif ($_.ErrorDetails.Message -ne $null) { $Script:ErrorMessage = $_.ErrorDetails.Message } elseif($_.FullyQualifiedErrorId -ne $null) { $Script:ErrorMessage = $_.FullyQualifiedErrorId } continue } $Error.Clear() $Scope = [System.Management.ManagementScope] "\\.\root\Microsoft\Windows\ClusterUpdate" $Scope.Connect() if ($Error.Count -eq 0) { $query = [System.Management.ObjectQuery] "Select * from MSFT_CAUNode" $Searcher = New-Object System.Management.ManagementObjectSearcher $Searcher.Scope = $Scope $Searcher.Query = $query $Searcher.Get() } if ($Error.Count -gt 0) { $RootCauseDetected = $true $InformationCollected | add-member -membertype noteproperty -name "Cluster Node" -value $ComputerName $InformationCollected | add-member -membertype noteproperty -name "WMI namespace" -value 'root\Microsoft\Windows\ClusterUpdate' $InformationCollected | add-member -membertype noteproperty -name "WMI Class" -value 'MSFT_CAUNode' $InformationCollected | add-member -membertype noteproperty -name "Error accessing Class" -value $Script:ErrorMessage $InformationCollected | add-member -membertype noteproperty -name "Exception code" -value $Script:ErrorCode } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB+CPouWGtLilfA # nnLCONmz6uCGVOjFVZTqS9cY5RmcpKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFP4WgDEPcbiop4FMOA14jJm # Oa+e4EYgd3bC7NtyS5jyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAUfb2B3M6ayTC4FwCjVOeiAV5Symx5uZlrWjuraZY7jJpbrPkIDFSRiGO # rlGkBy//V71xKdgkuJJSWhlsvSV6G0v/KGoLaSfLPZNCwX059AiICVCEV0GnGYkf # p50zdLQlQF1Ip/gGwxJmk59H+e8xvL3KhmDCCfCccW9SwQ5UfcdNmP3ytC952rNM # Qc4LmfDIiTLPzS6EoSlKWj3W8upnIquzjzyaNF/h2dLoqMjen+QTjNEYrUvrZOv0 # FchZMKN3vIg14aa3/XKT8YoLFEepr4v3zj6PuDyobTVVM6okIPvAG0wM8gtVHugX # mgTU98+7V68D5bfeh9mNwrL1B2Qy2aGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAlCjvdYghahAcoYuvvVe4hJoPbaS2XKQq/D+dk8WsBOgIGZxp1kNwj # GBMyMDI0MTAyODExNDA0MC43MDlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smRDzAiGA8yMDI0MTAyODA0MjY1 # NVoYDzIwMjQxMDI5MDQyNjU1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZEP # AgEAMAcCAQACAhTEMAcCAQACAhPHMAoCBQDqyuKPAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAHKM99UwoPSM+XhXj9JQE0j3fiHtBHop/3nnFpjQj8V83hqU # 5S4zNupqga4qWf4ER6xtR+I8qqmZvqZ6vV8e+IqzOJ9xvEgbrAR5K6X+m/0UulYt # n4mNtjFswU0pnvvDMRJ0z5k68F8c0jh94jLA5XDWpS9MpP5gv2jcKAx6bUdU1GWp # un+uoXQ2wajPrQVTjdnnIihSkPFnaSAZ9v5Wl5peuAnC5l3l2pWNTP/uI425dd/q # lyg95Ug5B1eiceCbJS5ASgJyIA//msCuwJM8p5HX4cRcvA2b/9gGyJGQQ0VcBEld # HI8hfTAAtAbbG76IFJa/SubdiXplDokIkex/GRIxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB6TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCDHtxO58ehri6G5lDzDowdfYxhpSOi/O/m7amXccc4HBjCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4riVo # rGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgSBS8Q6r5BbZ0l6HNgYtnviUBT9Vn # cdigzcIj/qNKQaIwDQYJKoZIhvcNAQELBQAEggIAPMhc0ABoA1rRbkDKbEcPrVa/ # +oM/znyEElOFfbXEdX7GAKo4hp4STN+lXVBPph/2eH+QNwCcojrY0ek/umaV87IK # j6CbzfmwLnKKhZQFPP8oV3MUYWL/0gtl0KWBQdEkIKtYL1dKPqugiBwCPMN2J6Vb # RrTJPiqS69AOxyRPJBmnZQ3VJ8NG5PoaZeLiHVkIjNS1EBW5YlmTEmzZI8YfgAiE # p+z5o40JsDSfcLLRkMwKQ0vkyu1z8GeLYlx77nvRF4AmF5HKlhEvWoCatjBZHhZR # Y3uA9mqzg8S/IV5HEO0ggCtSlWCVW/h+uz3uI3Zfs6uEKSm/cP9Puu+cMS57Pdtg # 7n8vninwJDEwqdiIz18cxIlsszlK2y/o7dWA2Kd8zpih8rLU48MaDJrNNHsFNKzx # HSnSKT/w8AaL8EfBj4zoxmi9g4sKWfVPO9N6zvm2cYAdaVBw+JMUM/cFXuQjCYQ4 # qoo5dqFroTNxDQB8bPvT2qYNQnebVQdBObq9isIH8mX8c7+N/hqcZuiWJLlKNo+2 # HSsaWd23EjfF1BHa9eIHemj3N6ebcYArojxFY4/LtTunUTtg44sPrsHbBvVcAbjs # ySk3WCjqFGQ604oXuS6mSf8yBjgSbB9A3mQQsAGZ8FDKElUXUN6mRudRmgeHRG4K # VbwPiqpINDvxwNJ1DMo= # SIG # End signature block
combined_dataset/train/non-malicious/sample_43_35.ps1
sample_43_35.ps1
# # Module manifest for module 'OCI.PSModules.Aidocument' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Aidocument.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '48b9296a-b4a7-43bb-8d59-3eaf832baf2a' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Aidocument Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aidocument.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAidocumentModel', 'Get-OCIAidocumentModelsList', 'Get-OCIAidocumentProcessorJob', 'Get-OCIAidocumentProject', 'Get-OCIAidocumentProjectsList', 'Get-OCIAidocumentWorkRequest', 'Get-OCIAidocumentWorkRequestErrorsList', 'Get-OCIAidocumentWorkRequestLogsList', 'Get-OCIAidocumentWorkRequestsList', 'Invoke-OCIAidocumentAnalyzeDocument', 'Invoke-OCIAidocumentPatchModel', 'Move-OCIAidocumentModelCompartment', 'Move-OCIAidocumentProjectCompartment', 'New-OCIAidocumentModel', 'New-OCIAidocumentProcessorJob', 'New-OCIAidocumentProject', 'Remove-OCIAidocumentModel', 'Remove-OCIAidocumentProject', 'Stop-OCIAidocumentProcessorJob', 'Stop-OCIAidocumentWorkRequest', 'Update-OCIAidocumentModel', 'Update-OCIAidocumentProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aidocument' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/203.ps1
203.ps1
[CmdletBinding()] PARAM ( [Alias("ExpirationDays")] [Int]$Days = '10', [String]$SearchBase = "", [string]$EmailFrom = "ScriptServer@Contoso.com", [string]$EmailTo = "IT@Contoso.com", [String]$EmailSMTPServer = "smtp.contoso.com" ) BEGIN { [String]$EmailSubject = "PS Report-ActiveDirectory-Expiring Users (in the next $days days)" [String]$NoteLine = "Generated from $($env:Computername.ToUpper()) on $(Get-Date -format 'yyyy/MM/dd HH:mm:ss')" Function Send-Email { [CmdletBinding()] PARAM ( [Parameter(Mandatory = $true)] [Alias('To')] [String]$EmailTo, [Parameter(Mandatory = $true)] [Alias('From')] [String]$EmailFrom, [String]$EmailCC, [String]$EmailBCC, [String]$Subject = "Email from PowerShell", [String]$Body = "Hello World", [Switch]$BodyIsHTML = $false, [ValidateSet("Default", "ASCII", "Unicode", "UTF7", "UTF8", "UTF32")] [System.Text.Encoding]$Encoding = "Default", [String]$Attachment, [Parameter(ParameterSetName = "Credential", Mandatory = $true)] [String]$Username, [Parameter(ParameterSetName = "Credential", Mandatory = $true)] [String]$Password, [Parameter(Mandatory = $true)] [ValidateScript({ Test-Connection -ComputerName $_ -Count 1 -Quiet })] [string]$SMTPServer, [ValidateRange(1, 65535)] [int]$Port, [Switch]$EnableSSL ) PROCESS { TRY { $SMTPMessage = New-Object System.Net.Mail.MailMessage $SMTPMessage.From = $EmailFrom $SMTPMessage.To = $EmailTo $SMTPMessage.Body = $Body $SMTPMessage.Subject = $Subject $SMTPMessage.CC = $EmailCC $SMTPMessage.Bcc = $EmailBCC $SMTPMessage.IsBodyHtml = $BodyIsHtml $SMTPMessage.BodyEncoding = $Encoding $SMTPMessage.SubjectEncoding = $Encoding IF ($PSBoundParameters['attachment']) { $SMTPattachment = New-Object -TypeName System.Net.Mail.Attachment($attachment) $SMTPMessage.Attachments.Add($STMPattachment) } $SMTPClient = New-Object Net.Mail.SmtpClient $SMTPClient.Host = $SmtpServer $SMTPClient.Port = $Port IF ($PSBoundParameters['EnableSSL']) { $SMTPClient.EnableSsl = $true } IF (($PSBoundParameters['Username']) -and ($PSBoundParameters['Password'])) { $Credentials = New-Object -TypeName System.Net.NetworkCredential $Credentials.UserName = $username.Split("@")[0] $Credentials.Password = $Password $SMTPClient.Credentials = $Credentials } $SMTPClient.Send($SMTPMessage) } CATCH { Write-Warning -message "[PROCESS] Something wrong happened" Write-Warning -Message $Error[0].Exception.Message } } END { Remove-Variable -Name SMTPClient Remove-Variable -Name Password } } } PROCESS { TRY { $Accounts = Search-ADAccount -AccountExpiring -SearchBase $SearchBase -TimeSpan "$($days).00:00:00" | Select-Object -Property AccountExpirationDate, Name, Samaccountname, @{ Label = "Manager"; E = { (Get-Aduser(Get-aduser $_ -property manager).manager).Name } }, DistinguishedName $Css = @" <style> table { font-family: verdana,arial,sans-serif; font-size:11px; color: border-width: 1px; border-color: border-collapse: collapse; } th { border-width: 1px; padding: 8px; border-style: solid; border-color: background-color: } td { border-width: 1px; padding: 8px; border-style: solid; border-color: background-color: } </style> "@ $PreContent = "<Title>Active Directory - Expiring Users (next $days days)</Title>" $PostContent = "<br><p><font size='2'><i>$NoteLine</i></font>" IF (-not ($accounts)) { $body = "No user account expiring in the next $days days to report <br>$PostContent" } ELSE { $body = $Accounts | ConvertTo-Html -head $Css -PostContent $PostContent -PreContent $PreContent } Send-Email -SMTPServer $EmailSMTPServer -From $EmailFrom -To $Emailto -BodyIsHTML ` -Subject $EmailSubject -Body $body } CATCH { Write-Warning -Message "[PROCESS] Something happened" Write-Warning -Message $Error[0].Exception.Message } } END { }
combined_dataset/train/non-malicious/4412.ps1
4412.ps1
Microsoft.PowerShell.Core\Set-StrictMode -Version Latest $script:IsInbox = $PSHOME.EndsWith('\WindowsPowerShell\v1.0', [System.StringComparison]::OrdinalIgnoreCase) $script:IsWindows = (-not (Get-Variable -Name IsWindows -ErrorAction Ignore)) -or $IsWindows $script:IsLinux = (Get-Variable -Name IsLinux -ErrorAction Ignore) -and $IsLinux $script:IsMacOS = (Get-Variable -Name IsMacOS -ErrorAction Ignore) -and $IsMacOS $script:IsCoreCLR = $PSVersionTable.ContainsKey('PSEdition') -and $PSVersionTable.PSEdition -eq 'Core' $script:IsNanoServer = & { if (!$script:IsWindows) { return $false } $serverLevelsPath = 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Server\ServerLevels\' if (Test-Path -Path $serverLevelsPath) { $NanoItem = Get-ItemProperty -Name NanoServer -Path $serverLevelsPath -ErrorAction Ignore if ($NanoItem -and ($NanoItem.NanoServer -eq 1)) { return $true } } return $false } if ($script:IsInbox) { $script:ProgramFilesPSPath = Microsoft.PowerShell.Management\Join-Path -Path $env:ProgramFiles -ChildPath "WindowsPowerShell" } elseif ($script:IsCoreCLR) { if ($script:IsWindows) { $script:ProgramFilesPSPath = Microsoft.PowerShell.Management\Join-Path -Path $env:ProgramFiles -ChildPath 'PowerShell' } else { $script:ProgramFilesPSPath = Microsoft.PowerShell.Management\Split-Path -Path ([System.Management.Automation.Platform]::SelectProductNameForDirectory('SHARED_MODULES')) -Parent } } try { $script:MyDocumentsFolderPath = [Environment]::GetFolderPath("MyDocuments") } catch { $script:MyDocumentsFolderPath = $null } if ($script:IsInbox) { $script:MyDocumentsPSPath = if ($script:MyDocumentsFolderPath) { Microsoft.PowerShell.Management\Join-Path -Path $script:MyDocumentsFolderPath -ChildPath "WindowsPowerShell" } else { Microsoft.PowerShell.Management\Join-Path -Path $env:USERPROFILE -ChildPath "Documents\WindowsPowerShell" } } elseif ($script:IsCoreCLR) { if ($script:IsWindows) { $script:MyDocumentsPSPath = if ($script:MyDocumentsFolderPath) { Microsoft.PowerShell.Management\Join-Path -Path $script:MyDocumentsFolderPath -ChildPath 'PowerShell' } else { Microsoft.PowerShell.Management\Join-Path -Path $HOME -ChildPath "Documents\PowerShell" } } else { $script:MyDocumentsPSPath = Microsoft.PowerShell.Management\Split-Path -Path ([System.Management.Automation.Platform]::SelectProductNameForDirectory('USER_MODULES')) -Parent } } $script:ProgramFilesModulesPath = Microsoft.PowerShell.Management\Join-Path -Path $script:ProgramFilesPSPath -ChildPath 'Modules' $script:MyDocumentsModulesPath = Microsoft.PowerShell.Management\Join-Path -Path $script:MyDocumentsPSPath -ChildPath 'Modules' $script:ProgramFilesScriptsPath = Microsoft.PowerShell.Management\Join-Path -Path $script:ProgramFilesPSPath -ChildPath 'Scripts' $script:MyDocumentsScriptsPath = Microsoft.PowerShell.Management\Join-Path -Path $script:MyDocumentsPSPath -ChildPath 'Scripts' $script:PSGetPath = [pscustomobject]@{ AllUsersModules = $script:ProgramFilesModulesPath AllUsersScripts = $script:ProgramFilesScriptsPath CurrentUserModules = $script:MyDocumentsModulesPath CurrentUserScripts = $script:MyDocumentsScriptsPath PSTypeName = 'Microsoft.PowerShell.Commands.PSGetPath' } $script:TempPath = [System.IO.Path]::GetTempPath() $script:PSGetItemInfoFileName = "PSGetModuleInfo.xml" if ($script:IsWindows) { $script:PSGetProgramDataPath = Microsoft.PowerShell.Management\Join-Path -Path $env:ProgramData -ChildPath 'Microsoft\Windows\PowerShell\PowerShellGet\' $script:PSGetAppLocalPath = Microsoft.PowerShell.Management\Join-Path -Path $env:LOCALAPPDATA -ChildPath 'Microsoft\Windows\PowerShell\PowerShellGet\' } else { $script:PSGetProgramDataPath = Microsoft.PowerShell.Management\Join-Path -Path ([System.Management.Automation.Platform]::SelectProductNameForDirectory('CONFIG')) -ChildPath 'PowerShellGet' $script:PSGetAppLocalPath = Microsoft.PowerShell.Management\Join-Path -Path ([System.Management.Automation.Platform]::SelectProductNameForDirectory('CACHE')) -ChildPath 'PowerShellGet' } $script:PSGetModuleSourcesFilePath = Microsoft.PowerShell.Management\Join-Path -Path $script:PSGetAppLocalPath -ChildPath "PSRepositories.xml" $script:PSGetModuleSources = $null $script:PSGetInstalledModules = $null $script:PSGetSettingsFilePath = Microsoft.PowerShell.Management\Join-Path -Path $script:PSGetAppLocalPath -ChildPath "PowerShellGetSettings.xml" $script:PSGetSettings = $null $script:MyDocumentsInstalledScriptInfosPath = Microsoft.PowerShell.Management\Join-Path -Path $script:MyDocumentsScriptsPath -ChildPath 'InstalledScriptInfos' $script:ProgramFilesInstalledScriptInfosPath = Microsoft.PowerShell.Management\Join-Path -Path $script:ProgramFilesScriptsPath -ChildPath 'InstalledScriptInfos' $script:IsRunningAsElevated = $true $script:IsRunningAsElevatedTested = $false $script:InstalledScriptInfoFileName = 'InstalledScriptInfo.xml' $script:PSGetInstalledScripts = $null $Script:PSGalleryModuleSource = "PSGallery" $Script:PSGallerySourceUri = 'https://www.powershellgallery.com/api/v2' $Script:PSGalleryPublishUri = 'https://www.powershellgallery.com/api/v2/package/' $Script:PSGalleryScriptSourceUri = 'https://www.powershellgallery.com/api/v2/items/psscript' $Script:PSGalleryV3SourceUri = 'https://www.powershellgallery.com/api/v3' $Script:ResponseUri = "ResponseUri" $Script:StatusCode = "StatusCode" $Script:Exception = "Exception" $script:PSModuleProviderName = 'PowerShellGet' $script:PackageManagementProviderParam = "PackageManagementProvider" $script:PublishLocation = "PublishLocation" $script:ScriptSourceLocation = 'ScriptSourceLocation' $script:ScriptPublishLocation = 'ScriptPublishLocation' $script:Proxy = 'Proxy' $script:ProxyCredential = 'ProxyCredential' $script:Credential = 'Credential' $script:VSTSAuthenticatedFeedsDocUrl = 'https://go.microsoft.com/fwlink/?LinkID=698608' $script:Prerelease = "Prerelease" $script:NuGetProviderName = "NuGet" $script:NuGetProviderVersion = [Version]'2.8.5.201' $script:SupportsPSModulesFeatureName = "supports-powershell-modules" $script:FastPackRefHashtable = @{ } $script:NuGetBinaryProgramDataPath = if ($script:IsWindows) { "$env:ProgramFiles\PackageManagement\ProviderAssemblies" } $script:NuGetBinaryLocalAppDataPath = if ($script:IsWindows) { "$env:LOCALAPPDATA\PackageManagement\ProviderAssemblies" } $script:NuGetClientSourceURL = 'https://aka.ms/psget-nugetexe' $script:NuGetExeMinRequiredVersion = [Version]'4.1.0' $script:NuGetExeName = 'NuGet.exe' $script:NuGetExePath = $null $script:NuGetExeVersion = $null $script:NuGetProvider = $null $script:DotnetCommandName = 'dotnet' $script:MinimumDotnetCommandVersion = [Version]'2.0.0' $script:DotnetInstallUrl = 'https://aka.ms/dotnet-install-script' $script:DotnetCommandPath = $null $script:PSGetRequireLicenseAcceptanceFormatVersion = [Version]'2.0' $script:CurrentPSGetFormatVersion = $script:PSGetRequireLicenseAcceptanceFormatVersion $script:PSGetFormatVersion = "PowerShellGetFormatVersion" $script:SupportedPSGetFormatVersionMajors = @("1", "2") $script:ModuleReferences = 'Module References' $script:AllVersions = "AllVersions" $script:AllowPrereleaseVersions = "AllowPrereleaseVersions" $script:Filter = "Filter" $script:IncludeValidSet = @('DscResource', 'Cmdlet', 'Function', 'Workflow', 'RoleCapability') $script:DscResource = "PSDscResource" $script:Command = "PSCommand" $script:Cmdlet = "PSCmdlet" $script:Function = "PSFunction" $script:Workflow = "PSWorkflow" $script:RoleCapability = 'PSRoleCapability' $script:Includes = "PSIncludes" $script:Tag = "Tag" $script:NotSpecified = '_NotSpecified_' $script:PSGetModuleName = 'PowerShellGet' $script:FindByCanonicalId = 'FindByCanonicalId' $script:InstalledLocation = 'InstalledLocation' $script:PSArtifactType = 'Type' $script:PSArtifactTypeModule = 'Module' $script:PSArtifactTypeScript = 'Script' $script:All = 'All' $script:Name = 'Name' $script:Version = 'Version' $script:Guid = 'Guid' $script:Path = 'Path' $script:ScriptBase = 'ScriptBase' $script:Description = 'Description' $script:Author = 'Author' $script:CompanyName = 'CompanyName' $script:Copyright = 'Copyright' $script:Tags = 'Tags' $script:LicenseUri = 'LicenseUri' $script:ProjectUri = 'ProjectUri' $script:IconUri = 'IconUri' $script:RequiredModules = 'RequiredModules' $script:ExternalModuleDependencies = 'ExternalModuleDependencies' $script:ReleaseNotes = 'ReleaseNotes' $script:RequiredScripts = 'RequiredScripts' $script:ExternalScriptDependencies = 'ExternalScriptDependencies' $script:DefinedCommands = 'DefinedCommands' $script:DefinedFunctions = 'DefinedFunctions' $script:DefinedWorkflows = 'DefinedWorkflows' $script:TextInfo = (Get-Culture).TextInfo $script:PrivateData = 'PrivateData' $script:PSScriptInfoProperties = @($script:Name $script:Version, $script:Guid, $script:Path, $script:ScriptBase, $script:Description, $script:Author, $script:CompanyName, $script:Copyright, $script:Tags, $script:ReleaseNotes, $script:RequiredModules, $script:ExternalModuleDependencies, $script:RequiredScripts, $script:ExternalScriptDependencies, $script:LicenseUri, $script:ProjectUri, $script:IconUri, $script:DefinedCommands, $script:DefinedFunctions, $script:DefinedWorkflows, $script:PrivateData ) $script:SystemEnvironmentKey = 'HKLM:\System\CurrentControlSet\Control\Session Manager\Environment' $script:UserEnvironmentKey = 'HKCU:\Environment' $script:SystemEnvironmentVariableMaximumLength = 1024 $script:UserEnvironmentVariableMaximumLength = 255 $script:EnvironmentVariableTarget = @{ Process = 0; User = 1; Machine = 2 } $script:wildcardOptions = [System.Management.Automation.WildcardOptions]::CultureInvariant -bor ` [System.Management.Automation.WildcardOptions]::IgnoreCase $script:DynamicOptionTypeMap = @{ 0 = [string]; 1 = [string[]]; 2 = [int]; 3 = [switch]; 4 = [string]; 5 = [string]; 6 = [string]; 7 = [Uri]; 8 = [SecureString]; } $script:PackageManagementMessageResolverScriptBlock = { param($i, $Message) return (PackageManagementMessageResolver -MsgId $i, -Message $Message) } $script:PackageManagementSaveModuleMessageResolverScriptBlock = { param($i, $Message) $PackageTarget = $LocalizedData.InstallModulewhatIfMessage $QuerySaveUntrustedPackage = $LocalizedData.QuerySaveUntrustedPackage switch ($i) { 'ActionInstallPackage' { return "Save-Module" } 'QueryInstallUntrustedPackage' { return $QuerySaveUntrustedPackage } 'TargetPackage' { return $PackageTarget } Default { $Message = $Message -creplace "Install", "Download" $Message = $Message -creplace "install", "download" return (PackageManagementMessageResolver -MsgId $i, -Message $Message) } } } $script:PackageManagementInstallModuleMessageResolverScriptBlock = { param($i, $Message) $PackageTarget = $LocalizedData.InstallModulewhatIfMessage switch ($i) { 'ActionInstallPackage' { return "Install-Module" } 'TargetPackage' { return $PackageTarget } Default { return (PackageManagementMessageResolver -MsgId $i, -Message $Message) } } } $script:PackageManagementUnInstallModuleMessageResolverScriptBlock = { param($i, $Message) $PackageTarget = $LocalizedData.InstallModulewhatIfMessage switch ($i) { 'ActionUninstallPackage' { return "Uninstall-Module" } 'TargetPackageVersion' { return $PackageTarget } Default { return (PackageManagementMessageResolver -MsgId $i, -Message $Message) } } } $script:PackageManagementUpdateModuleMessageResolverScriptBlock = { param($i, $Message) $PackageTarget = ($LocalizedData.UpdateModulewhatIfMessage -replace "__OLDVERSION__", $($psgetItemInfo.Version)) switch ($i) { 'ActionInstallPackage' { return "Update-Module" } 'TargetPackage' { return $PackageTarget } Default { return (PackageManagementMessageResolver -MsgId $i, -Message $Message) } } } $script:WhitelistedModules = @{ "Pester" = $true "PSReadline" = $true } function PackageManagementMessageResolver($MsgID, $Message) { $NoMatchFound = $LocalizedData.NoMatchFound $SourceNotFound = $LocalizedData.SourceNotFound $ModuleIsNotTrusted = $LocalizedData.ModuleIsNotTrusted $RepositoryIsNotTrusted = $LocalizedData.RepositoryIsNotTrusted $QueryInstallUntrustedPackage = $LocalizedData.QueryInstallUntrustedPackage switch ($MsgID) { 'NoMatchFound' { return $NoMatchFound } 'SourceNotFound' { return $SourceNotFound } 'CaptionPackageNotTrusted' { return $ModuleIsNotTrusted } 'CaptionSourceNotTrusted' { return $RepositoryIsNotTrusted } 'QueryInstallUntrustedPackage' { return $QueryInstallUntrustedPackage } Default { if ($Message) { $tempMessage = $Message -creplace "PackageSource", "PSRepository" $tempMessage = $tempMessage -creplace "packagesource", "psrepository" $tempMessage = $tempMessage -creplace "Package", "Module" $tempMessage = $tempMessage -creplace "package", "module" $tempMessage = $tempMessage -creplace "Sources", "Repositories" $tempMessage = $tempMessage -creplace "sources", "repositories" $tempMessage = $tempMessage -creplace "Source", "Repository" $tempMessage = $tempMessage -creplace "source", "repository" return $tempMessage } } } } $script:PackageManagementMessageResolverScriptBlockForScriptCmdlets = { param($i, $Message) return (PackageManagementMessageResolverForScripts -MsgId $i, -Message $Message) } $script:PackageManagementSaveScriptMessageResolverScriptBlock = { param($i, $Message) $PackageTarget = $LocalizedData.InstallScriptwhatIfMessage $QuerySaveUntrustedPackage = $LocalizedData.QuerySaveUntrustedScriptPackage switch ($i) { 'ActionInstallPackage' { return "Save-Script" } 'QueryInstallUntrustedPackage' { return $QuerySaveUntrustedPackage } 'TargetPackage' { return $PackageTarget } Default { $Message = $Message -creplace "Install", "Download" $Message = $Message -creplace "install", "download" return (PackageManagementMessageResolverForScripts -MsgId $i, -Message $Message) } } } $script:PackageManagementInstallScriptMessageResolverScriptBlock = { param($i, $Message) $PackageTarget = $LocalizedData.InstallScriptwhatIfMessage switch ($i) { 'ActionInstallPackage' { return "Install-Script" } 'TargetPackage' { return $PackageTarget } Default { return (PackageManagementMessageResolverForScripts -MsgId $i, -Message $Message) } } } $script:PackageManagementUnInstallScriptMessageResolverScriptBlock = { param($i, $Message) $PackageTarget = $LocalizedData.InstallScriptwhatIfMessage switch ($i) { 'ActionUninstallPackage' { return "Uninstall-Script" } 'TargetPackageVersion' { return $PackageTarget } Default { return (PackageManagementMessageResolverForScripts -MsgId $i, -Message $Message) } } } $script:PackageManagementUpdateScriptMessageResolverScriptBlock = { param($i, $Message) $PackageTarget = ($LocalizedData.UpdateScriptwhatIfMessage -replace "__OLDVERSION__", $($psgetItemInfo.Version)) switch ($i) { 'ActionInstallPackage' { return "Update-Script" } 'TargetPackage' { return $PackageTarget } Default { return (PackageManagementMessageResolverForScripts -MsgId $i, -Message $Message) } } } function PackageManagementMessageResolverForScripts($MsgID, $Message) { $NoMatchFound = $LocalizedData.NoMatchFoundForScriptName $SourceNotFound = $LocalizedData.SourceNotFound $ScriptIsNotTrusted = $LocalizedData.ScriptIsNotTrusted $RepositoryIsNotTrusted = $LocalizedData.RepositoryIsNotTrusted $QueryInstallUntrustedPackage = $LocalizedData.QueryInstallUntrustedScriptPackage switch ($MsgID) { 'NoMatchFound' { return $NoMatchFound } 'SourceNotFound' { return $SourceNotFound } 'CaptionPackageNotTrusted' { return $ScriptIsNotTrusted } 'CaptionSourceNotTrusted' { return $RepositoryIsNotTrusted } 'QueryInstallUntrustedPackage' { return $QueryInstallUntrustedPackage } Default { if ($Message) { $tempMessage = $Message -creplace "PackageSource", "PSRepository" $tempMessage = $tempMessage -creplace "packagesource", "psrepository" $tempMessage = $tempMessage -creplace "Package", "Script" $tempMessage = $tempMessage -creplace "package", "script" $tempMessage = $tempMessage -creplace "Sources", "Repositories" $tempMessage = $tempMessage -creplace "sources", "repositories" $tempMessage = $tempMessage -creplace "Source", "Repository" $tempMessage = $tempMessage -creplace "source", "repository" return $tempMessage } } } } if ( -not ('Microsoft.PowerShell.Commands.PowerShellGet.InternalWebProxy' -as [Type])) { $RequiredAssembliesForInternalWebProxy = @( [System.Net.IWebProxy].Assembly.FullName, [System.Uri].Assembly.FullName ) $InternalWebProxySource = @' using System; using System.Net; namespace Microsoft.PowerShell.Commands.PowerShellGet { /// <summary> /// Used by Ping-Endpoint function to supply webproxy to HttpClient /// We cannot use System.Net.WebProxy because this is not available on CoreClr /// </summary> public class InternalWebProxy : IWebProxy { Uri _proxyUri; ICredentials _credentials; public InternalWebProxy(Uri uri, ICredentials credentials) { Credentials = credentials; _proxyUri = uri; } /// <summary> /// Credentials used by WebProxy /// </summary> public ICredentials Credentials { get { return _credentials; } set { _credentials = value; } } public Uri GetProxy(Uri destination) { return _proxyUri; } public bool IsBypassed(Uri host) { return false; } } } '@ try { $AddType_prams = @{ TypeDefinition = $InternalWebProxySource Language = 'CSharp' ErrorAction = 'SilentlyContinue' } if (-not $script:IsCoreCLR -or $script:IsNanoServer) { $AddType_prams['ReferencedAssemblies'] = $RequiredAssembliesForInternalWebProxy } Add-Type @AddType_prams } catch { Write-Warning -Message "InternalWebProxy: $_" } } if (('Microsoft.PowerShell.Telemetry.Internal.TelemetryAPI' -as [Type]) -and -not ('Microsoft.PowerShell.Commands.PowerShellGet.Telemetry' -as [Type])) { $RequiredAssembliesForTelemetry = @( [System.Management.Automation.PSCmdlet].Assembly.FullName ) $TelemetrySource = @' using System; using System.Management.Automation; namespace Microsoft.PowerShell.Commands.PowerShellGet { public static class Telemetry { public static void TraceMessageArtifactsNotFound(string[] artifactsNotFound, string operationName) { Microsoft.PowerShell.Telemetry.Internal.TelemetryAPI.TraceMessage(operationName, new { ArtifactsNotFound = artifactsNotFound }); } public static void TraceMessageNonPSGalleryRegistration(string sourceLocationType, string sourceLocationHash, string installationPolicy, string packageManagementProvider, string publishLocationHash, string scriptSourceLocationHash, string scriptPublishLocationHash, string operationName) { Microsoft.PowerShell.Telemetry.Internal.TelemetryAPI.TraceMessage(operationName, new { SourceLocationType = sourceLocationType, SourceLocationHash = sourceLocationHash, InstallationPolicy = installationPolicy, PackageManagementProvider = packageManagementProvider, PublishLocationHash = publishLocationHash, ScriptSourceLocationHash = scriptSourceLocationHash, ScriptPublishLocationHash = scriptPublishLocationHash }); } } } '@ try { $AddType_prams = @{ TypeDefinition = $TelemetrySource Language = 'CSharp' ErrorAction = 'SilentlyContinue' } $AddType_prams['ReferencedAssemblies'] = $RequiredAssembliesForTelemetry Add-Type @AddType_prams } catch { Write-Warning -Message "Telemetry: $_" } } $script:TelemetryEnabled = $false if ('Microsoft.PowerShell.Commands.PowerShellGet.Telemetry' -as [Type]) { $telemetryMethods = ([Microsoft.PowerShell.Commands.PowerShellGet.Telemetry] | Get-Member -Static).Name if ($telemetryMethods.Contains("TraceMessageArtifactsNotFound") -and $telemetryMethods.Contains("TraceMessageNonPSGalleryRegistration")) { $script:TelemetryEnabled = $true } } $script:IsSafeX509ChainHandleAvailable = ($null -ne ('Microsoft.Win32.SafeHandles.SafeX509ChainHandle' -as [Type])) if ($script:IsWindows -and -not ('Microsoft.PowerShell.Commands.PowerShellGet.Win32Helpers' -as [Type])) { $RequiredAssembliesForWin32Helpers = @() if ($script:IsSafeX509ChainHandleAvailable) { $SafeX509ChainHandleClassName = 'SafeX509ChainHandle' $RequiredAssembliesForWin32Helpers += [Microsoft.Win32.SafeHandles.SafeX509ChainHandle].Assembly.FullName } else { $SafeX509ChainHandleClassName = 'InternalSafeX509ChainHandle' } $Win32HelpersSource = @" using System; using System.Net; using Microsoft.Win32.SafeHandles; using System.Security.Cryptography; using System.Runtime.InteropServices; using System.Runtime.ConstrainedExecution; using System.Runtime.Versioning; using System.Security; namespace Microsoft.PowerShell.Commands.PowerShellGet { [StructLayout(LayoutKind.Sequential, CharSet=CharSet.Unicode)] public struct CERT_CHAIN_POLICY_PARA { public CERT_CHAIN_POLICY_PARA(int size) { cbSize = (uint) size; dwFlags = 0; pvExtraPolicyPara = IntPtr.Zero; } public uint cbSize; public uint dwFlags; public IntPtr pvExtraPolicyPara; } [StructLayout(LayoutKind.Sequential, CharSet=CharSet.Unicode)] public struct CERT_CHAIN_POLICY_STATUS { public CERT_CHAIN_POLICY_STATUS(int size) { cbSize = (uint) size; dwError = 0; lChainIndex = IntPtr.Zero; lElementIndex = IntPtr.Zero; pvExtraPolicyStatus = IntPtr.Zero; } public uint cbSize; public uint dwError; public IntPtr lChainIndex; public IntPtr lElementIndex; public IntPtr pvExtraPolicyStatus; } // Internal SafeHandleZeroOrMinusOneIsInvalid class to remove the dependency on .Net Framework 4.6. public abstract class InternalSafeHandleZeroOrMinusOneIsInvalid : SafeHandle { protected InternalSafeHandleZeroOrMinusOneIsInvalid(bool ownsHandle) : base(IntPtr.Zero, ownsHandle) { } public override bool IsInvalid { get { return handle == IntPtr.Zero || handle == new IntPtr(-1); } } } // Internal SafeX509ChainHandle class to remove the dependency on .Net Framework 4.6. [SecurityCritical] public sealed class InternalSafeX509ChainHandle : InternalSafeHandleZeroOrMinusOneIsInvalid { private InternalSafeX509ChainHandle () : base(true) {} internal InternalSafeX509ChainHandle (IntPtr handle) : base (true) { SetHandle(handle); } internal static InternalSafeX509ChainHandle InvalidHandle { get { return new InternalSafeX509ChainHandle(IntPtr.Zero); } } [SecurityCritical] override protected bool ReleaseHandle() { CertFreeCertificateChain(handle); return true; } [DllImport("Crypt32.dll", SetLastError=true)] $(if(-not $script:IsCoreCLR) { ' [SuppressUnmanagedCodeSecurity, ResourceExposure(ResourceScope.None), ReliabilityContract(Consistency.WillNotCorruptState, Cer.Success)] ' }) private static extern void CertFreeCertificateChain(IntPtr handle); } public class Win32Helpers { [DllImport("Crypt32.dll", CharSet=CharSet.Auto, SetLastError=true)] public extern static bool CertVerifyCertificateChainPolicy( [In] IntPtr pszPolicyOID, [In] $SafeX509ChainHandleClassName pChainContext, [In] ref CERT_CHAIN_POLICY_PARA pPolicyPara, [In,Out] ref CERT_CHAIN_POLICY_STATUS pPolicyStatus); [DllImport("Crypt32.dll", CharSet=CharSet.Auto, SetLastError=true)] public static extern $SafeX509ChainHandleClassName CertDuplicateCertificateChain( [In] IntPtr pChainContext); $(if($script:IsSafeX509ChainHandleAvailable) { @" [DllImport("Crypt32.dll", CharSet=CharSet.Auto, SetLastError=true)] $(if(-not $script:IsCoreCLR) { ' [ResourceExposure(ResourceScope.None)] ' }) public static extern SafeX509ChainHandle CertDuplicateCertificateChain( [In] SafeX509ChainHandle pChainContext); "@ }) public static bool IsMicrosoftCertificate([In] $SafeX509ChainHandleClassName pChainContext) { //------------------------------------------------------------------------- // CERT_CHAIN_POLICY_MICROSOFT_ROOT // // Checks if the last element of the first simple chain contains a // Microsoft root public key. If it doesn't contain a Microsoft root // public key, dwError is set to CERT_E_UNTRUSTEDROOT. // // pPolicyPara is optional. However, // MICROSOFT_ROOT_CERT_CHAIN_POLICY_ENABLE_TEST_ROOT_FLAG can be set in // the dwFlags in pPolicyPara to also check for the Microsoft Test Roots. // // MICROSOFT_ROOT_CERT_CHAIN_POLICY_CHECK_APPLICATION_ROOT_FLAG can be set // in the dwFlags in pPolicyPara to check for the Microsoft root for // application signing instead of the Microsoft product root. This flag // explicitly checks for the application root only and cannot be combined // with the test root flag. // // MICROSOFT_ROOT_CERT_CHAIN_POLICY_DISABLE_FLIGHT_ROOT_FLAG can be set // in the dwFlags in pPolicyPara to always disable the Flight root. // // pvExtraPolicyPara and pvExtraPolicyStatus aren't used and must be set // to NULL. //-------------------------------------------------------------------------- const uint MICROSOFT_ROOT_CERT_CHAIN_POLICY_ENABLE_TEST_ROOT_FLAG = 0x00010000; const uint MICROSOFT_ROOT_CERT_CHAIN_POLICY_CHECK_APPLICATION_ROOT_FLAG = 0x00020000; //const uint MICROSOFT_ROOT_CERT_CHAIN_POLICY_DISABLE_FLIGHT_ROOT_FLAG = 0x00040000; CERT_CHAIN_POLICY_PARA PolicyPara = new CERT_CHAIN_POLICY_PARA(Marshal.SizeOf(typeof(CERT_CHAIN_POLICY_PARA))); CERT_CHAIN_POLICY_STATUS PolicyStatus = new CERT_CHAIN_POLICY_STATUS(Marshal.SizeOf(typeof(CERT_CHAIN_POLICY_STATUS))); int CERT_CHAIN_POLICY_MICROSOFT_ROOT = 7; PolicyPara.dwFlags = (uint) MICROSOFT_ROOT_CERT_CHAIN_POLICY_ENABLE_TEST_ROOT_FLAG; bool isMicrosoftRoot = false; if(CertVerifyCertificateChainPolicy(new IntPtr(CERT_CHAIN_POLICY_MICROSOFT_ROOT), pChainContext, ref PolicyPara, ref PolicyStatus)) { isMicrosoftRoot = (PolicyStatus.dwError == 0); } // Also check for the Microsoft root for application signing if the Microsoft product root verification is unsuccessful. if(!isMicrosoftRoot) { // Some Microsoft modules can be signed with Microsoft Application Root instead of Microsoft Product Root, // So we need to use the MICROSOFT_ROOT_CERT_CHAIN_POLICY_CHECK_APPLICATION_ROOT_FLAG for the certificate verification. // MICROSOFT_ROOT_CERT_CHAIN_POLICY_CHECK_APPLICATION_ROOT_FLAG can not be used // with MICROSOFT_ROOT_CERT_CHAIN_POLICY_ENABLE_TEST_ROOT_FLAG, // so additional CertVerifyCertificateChainPolicy call is required to verify the given certificate is in Microsoft Application Root. // CERT_CHAIN_POLICY_PARA PolicyPara2 = new CERT_CHAIN_POLICY_PARA(Marshal.SizeOf(typeof(CERT_CHAIN_POLICY_PARA))); CERT_CHAIN_POLICY_STATUS PolicyStatus2 = new CERT_CHAIN_POLICY_STATUS(Marshal.SizeOf(typeof(CERT_CHAIN_POLICY_STATUS))); PolicyPara2.dwFlags = (uint) MICROSOFT_ROOT_CERT_CHAIN_POLICY_CHECK_APPLICATION_ROOT_FLAG; if(CertVerifyCertificateChainPolicy(new IntPtr(CERT_CHAIN_POLICY_MICROSOFT_ROOT), pChainContext, ref PolicyPara2, ref PolicyStatus2)) { isMicrosoftRoot = (PolicyStatus2.dwError == 0); } } return isMicrosoftRoot; } } } "@ try { $AddType_prams = @{ TypeDefinition = $Win32HelpersSource Language = 'CSharp' ErrorAction = 'SilentlyContinue' } if ((-not $script:IsCoreCLR -or $script:IsNanoServer) -and $RequiredAssembliesForWin32Helpers) { $AddType_prams['ReferencedAssemblies'] = $RequiredAssembliesForWin32Helpers } Add-Type @AddType_prams } catch { Write-Warning -Message "Win32Helpers: $_" } }
combined_dataset/train/non-malicious/3837.ps1
3837.ps1
function TopicTests { $location = Get-LocationForEventGrid $topicName = Get-TopicName $topicName2 = Get-TopicName $topicName3 = Get-TopicName $topicName4 = Get-TopicName $resourceGroupName = Get-ResourceGroupName $secondResourceGroup = Get-ResourceGroupName $subscriptionId = Get-SubscriptionId New-ResourceGroup $resourceGroupName $location New-ResourceGroup $secondResourceGroup $location try { Write-Debug "Creating a new EventGrid Topic: $topicName in resource group $resourceGroupName" Write-Debug "Topic: $topicName" $result = New-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName -Location $location Assert-True {$result.ProvisioningState -eq "Succeeded"} Write-Debug "Getting the created topic within the resource group" $createdTopic = Get-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName Assert-True {$createdTopic.Count -eq 1} Assert-True {$createdTopic.TopicName -eq $topicName} "Topic created earlier is not found." Write-Debug "Creating a second EventGrid topic: $topicName2 in resource group $secondResourceGroup" $result = New-AzEventGridTopic -ResourceGroup $secondResourceGroup -Name $topicName2 -Location $location -Tag @{ Dept = "IT"; Environment = "Test" } Assert-True {$result.ProvisioningState -eq "Succeeded"} Write-Debug "Creating a third EventGrid topic: $topicName3 in resource group $secondResourceGroup" $result = New-AzEventGridTopic -ResourceGroup $secondResourceGroup -Name $topicName3 -Location $location Assert-True {$result.ProvisioningState -eq "Succeeded"} Write-Debug "Getting the created topic $topicName3 within the resource group using the resourceId" $createdTopic = Get-AzEventGridTopic -ResourceId "/subscriptions/$subscriptionId/resourceGroups/$secondResourceGroup/providers/Microsoft.EventGrid/topics/$topicName3" Assert-True {$createdTopic.Count -eq 1} Assert-True {$createdTopic.TopicName -eq $topicName3} "Topic created earlier is not found." Write-Debug "Listing all the topics created in the resourceGroup $secondResourceGroup" $allCreatedTopics = Get-AzEventGridTopic -ResourceGroup $secondResourceGroup Assert-True {$allCreatedTopics.PsTopicsList.Count -ge 0 } "Topic created earlier is not found in the list" Write-Debug "Listing the topics created in the resourceGroup $secondResourceGroup using Top option" $allCreatedTopics = Get-AzEventGridTopic -ResourceGroup $secondResourceGroup -Top 1 Assert-True {$allCreatedTopics.NextLink -ne $null } "NextLink should not be null as more topics should be available under resource group.." Write-Debug "Listing the next topics created in the resourceGroup $secondResourceGroup using NextLink" $allCreatedTopics = Get-AzEventGridTopic -NextLink $allCreatedTopics.NextLink Write-Debug "Getting the first 1 topic created in the subscription using Top options" $allCreatedTopics = Get-AzEventGridTopic -Top 1 Assert-True {$allCreatedTopics.PsTopicsList.Count -ge 0} "Topics created earlier are not found." Assert-True {$allCreatedTopics.NextLink -ne $null } "NextLink should not be null as more topics should be available under the azure subscription." Write-Debug "Listing the next topics created in the subscription using NextLink" $allCreatedTopics = Get-AzEventGridTopic -NextLink $allCreatedTopics.NextLink Write-Debug "Getting all the topics created in the subscription" $allCreatedTopics = Get-AzEventGridTopic Assert-True {$allCreatedTopics.PsTopicsList.Count -ge 0} "Topics created earlier are not found." Write-Debug "Deleting topic: $topicName" Remove-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName Write-Debug "Creating a new EventGrid Topic: $topicName4 in resource group $resourceGroupName" $result = New-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName4 -Location $location Write-Debug "Deleting topic: $topicName4 using the InputObject parameter set" Get-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName4 | Remove-AzEventGridTopic Write-Debug "Deleting topic: $topicName2 using the ResourceID parameter set" Remove-AzEventGridTopic -ResourceId "/subscriptions/$subscriptionId/resourceGroups/$secondResourceGroup/providers/Microsoft.EventGrid/topics/$topicName2" Remove-AzEventGridTopic -ResourceGroup $secondResourceGroup -Name $topicName3 $returnedTopics1 = Get-AzEventGridTopic -ResourceGroup $resourceGroupName Assert-True {$returnedTopics1.PsTopicsList.Count -eq 0} $returnedTopics2 = Get-AzEventGridTopic -ResourceGroup $secondResourceGroup Assert-True {$returnedTopics2.PsTopicsList.Count -eq 0} } finally { Remove-ResourceGroup $resourceGroupName Remove-ResourceGroup $secondResourceGroup } } function TopicSetTests { $location = Get-LocationForEventGrid $topicName = Get-TopicName $resourceGroupName = Get-ResourceGroupName $subscriptionId = Get-SubscriptionId New-ResourceGroup $resourceGroupName $location try { Write-Debug "Creating a new EventGrid Topic: $topicName in resource group $resourceGroupName" Write-Debug "Topic: $topicName" $result = New-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName -Location $location Assert-True {$result.ProvisioningState -eq "Succeeded"} Write-Debug "Calling Set-AzEventGridTopic on the created topic $topicName" $tags1 = @{test1 = "testval1"; test2 = "testval2" }; $replacedTopic1 = Set-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName -Tag $tags1 Assert-True {$replacedTopic1.Count -eq 1} Assert-True {$replacedTopic1.TopicName -eq $topicName} "Topic updated earlier is not found." Write-Debug "Calling Set-AzEventGridTopic on the created topic $topicName" $tags2 = @{test1 = "testval1"; test2 = "testval2" }; $replacedTopic2 = Set-AzEventGridTopic -ResourceId "/subscriptions/$subscriptionId/resourceGroups/$resourceGroupName/providers/Microsoft.EventGrid/topics/$topicName" -Tag $tags2 Assert-True {$replacedTopic2.Count -eq 1} Assert-True {$replacedTopic2.TopicName -eq $topicName} "Topic updated earlier is not found." $returned_tags2 = $replacedTopic2.Tags; Assert-AreEqual 2 $returned_tags2.Count; Assert-AreEqual $tags2["test1"] $returned_tags2["test1"]; Assert-AreEqual $tags2["test2"] $returned_tags2["test2"]; Write-Debug "Calling Set-AzEventGridTopic on the created topic $topicName" $tags3 = @{test1 = "testval10"; test2 = "testval20" }; $replacedTopic3 = Get-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName | Set-AzEventGridTopic -Tag $tags3 Assert-True {$replacedTopic3.Count -eq 1} Assert-True {$replacedTopic3.TopicName -eq $topicName} "Topic updated earlier is not found." $returned_tags3 = $replacedTopic3.Tags; Assert-AreEqual 2 $returned_tags3.Count; Assert-AreEqual $tags3["test1"] $returned_tags3["test1"]; Assert-AreEqual $tags3["test2"] $returned_tags3["test2"]; Write-Debug "Deleting topic: $topicName" Remove-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName } finally { Remove-ResourceGroup $resourceGroupName } } function TopicGetKeyTests { $location = Get-LocationForEventGrid $topicName = Get-TopicName $resourceGroupName = Get-ResourceGroupName $subscriptionId = Get-SubscriptionId New-ResourceGroup $resourceGroupName $location try { Write-Debug "Creating a new EventGrid Topic: $topicName in resource group $resourceGroupName" $result = New-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName -Location $location Assert-True {$result.ProvisioningState -eq "Succeeded"} $sharedAccessKeys = Get-AzEventGridTopicKey -ResourceGroup $resourceGroupName -Name $topicName Assert-True {$sharedAccessKeys.Count -eq 1} $sharedAccessKeys = Get-AzEventGridTopicKey -ResourceId "/subscriptions/$subscriptionId/resourceGroups/$resourceGroupName/providers/Microsoft.EventGrid/topics/$topicName" Assert-True {$sharedAccessKeys.Count -eq 1} $sharedAccessKeys = Get-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName | Get-AzEventGridTopicKey Assert-True {$sharedAccessKeys.Count -eq 1} Write-Debug "Deleting topic: $topicName" Remove-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName } finally { Remove-ResourceGroup $resourceGroupName } } function TopicNewKeyTests { $location = Get-LocationForEventGrid $topicName = Get-TopicName $resourceGroupName = Get-ResourceGroupName $subscriptionId = Get-SubscriptionId New-ResourceGroup $resourceGroupName $location try { Write-Debug "Creating a new EventGrid Topic: $topicName in resource group $resourceGroupName" $result = New-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName -Location $location Assert-True {$result.ProvisioningState -eq "Succeeded"} $sharedAccessKeys = New-AzEventGridTopicKey -ResourceGroup $resourceGroupName -TopicName $topicName -KeyName "key1" Assert-True {$sharedAccessKeys.Count -eq 1} $sharedAccessKeys = New-AzEventGridTopicKey -ResourceId "/subscriptions/$subscriptionId/resourceGroups/$resourceGroupName/providers/Microsoft.EventGrid/topics/$topicName" -KeyName "key2" Assert-True {$sharedAccessKeys.Count -eq 1} $sharedAccessKeys = Get-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName | New-AzEventGridTopicKey -KeyName "key2" Assert-True {$sharedAccessKeys.Count -eq 1} Write-Debug "Deleting topic: $topicName" Remove-AzEventGridTopic -ResourceGroup $resourceGroupName -Name $topicName } finally { Remove-ResourceGroup $resourceGroupName } }
combined_dataset/train/non-malicious/sample_46_33.ps1
sample_46_33.ps1
param( [Parameter(Mandatory=$true)][int] $BuildId, [Parameter(Mandatory=$true)][int] $PublishingInfraVersion, [Parameter(Mandatory=$true)][string] $AzdoToken, [Parameter(Mandatory=$true)][string] $MaestroToken, [Parameter(Mandatory=$false)][string] $MaestroApiEndPoint = 'https://maestro.dot.net', [Parameter(Mandatory=$true)][string] $WaitPublishingFinish, [Parameter(Mandatory=$false)][string] $ArtifactsPublishingAdditionalParameters, [Parameter(Mandatory=$false)][string] $SymbolPublishingAdditionalParameters ) try { . $PSScriptRoot\post-build-utils.ps1 $darc = Get-Darc $optionalParams = [System.Collections.ArrayList]::new() if ("" -ne $ArtifactsPublishingAdditionalParameters) { $optionalParams.Add("--artifact-publishing-parameters") | Out-Null $optionalParams.Add($ArtifactsPublishingAdditionalParameters) | Out-Null } if ("" -ne $SymbolPublishingAdditionalParameters) { $optionalParams.Add("--symbol-publishing-parameters") | Out-Null $optionalParams.Add($SymbolPublishingAdditionalParameters) | Out-Null } if ("false" -eq $WaitPublishingFinish) { $optionalParams.Add("--no-wait") | Out-Null } & $darc add-build-to-channel ` --id $buildId ` --publishing-infra-version $PublishingInfraVersion ` --default-channels ` --source-branch main ` --azdev-pat $AzdoToken ` --bar-uri $MaestroApiEndPoint ` --password $MaestroToken ` @optionalParams if ($LastExitCode -ne 0) { Write-Host "Problems using Darc to promote build ${buildId} to default channels. Stopping execution..." exit 1 } Write-Host 'done.' } catch { Write-Host $_ Write-PipelineTelemetryError -Category 'PromoteBuild' -Message "There was an error while trying to publish build '$BuildId' to default channels." ExitWithExitCode 1 }
combined_dataset/train/non-malicious/sample_58_84.ps1
sample_58_84.ps1
#Requires -RunAsAdministrator ##------------------------------------------------------------------ ## <copyright file="Uninstall-ObservabilityExtension.ps1" company="Microsoft"> ## Copyright (C) Microsoft. All rights reserved. ## </copyright> ##------------------------------------------------------------------ <# .SYNOPSIS Uninstalls Observability Arc Extension. .DESCRIPTION The script uninstalls Observability Arc Extension from HCI environment. 1. It retrieves information from Arc for Server Agent, including subscriptionId, tenantId and resourceGroupName. 2. It installs Az.Accounts and Az.ConnectedMachine modules (if not present already) which are needed as a pre-requisite step. 3. It authenticates the user using 2FA and will continue after user confirms their identity by following the instructions (i.e. "WARNING: To sign in, use a web browser to open the page https://microsoft.com/devicelogin and enter the code ****** to authenticate.."). 4. It uninstalls the extension from all cluster nodes or local node only (if the node is not a part of cluster). .EXAMPLE .\Uninstall-ObservabilityExtension.ps1 .\Uninstall-ObservabilityExtension.ps1 -Verbose .NOTES If Arc for Server agent is not running on the nodes or if cluster is not registered, the script would fail as it cannot fetch the required details to install the extension. #> [CmdletBinding()] Param() $ErrorActionPreference = "Stop" $functionName = $MyInvocation.MyCommand.Name #region Constants $customExtName = 'TelemetryAndDiagnostics' #endregion Constants #region Helper Functions Function Get-ExceptionDetails { [CmdLetBinding()] Param ( [Parameter(Mandatory, ValueFromPipeline)] [System.Management.Automation.ErrorRecord] $ErrorObject ) return @{ Errormsg = $ErrorObject.ToString() Exception = $ErrorObject.Exception.ToString() Stacktrace = $ErrorObject.ScriptStackTrace Failingline = $ErrorObject.InvocationInfo.Line Positionmsg = $ErrorObject.InvocationInfo.PositionMessage PScommandpath = $ErrorObject.InvocationInfo.PSCommandPath Failinglinenumber = $ErrorObject.InvocationInfo.ScriptLineNumber Scriptname = $ErrorObject.InvocationInfo.ScriptName } | ConvertTo-Json # The ConvertTo-Json will return the entire hashtable as string. } Function Write-Log { [CmdletBinding()] Param ( [Parameter(Mandatory, ValueFromPipeline)] [System.String] $Message, [Parameter(Mandatory=$False)] [ValidateSet("INFO","VERBOSE","WARN","ERROR")] [System.String] $Level = "INFO" ) $dateTimeStamp = $(Get-Date).ToString('u') $formattedMessage = "$dateTimeStamp : $Level : $Message" switch($Level.toUpper()) { "INFO" { Write-Host $formattedMessage break; } "VERBOSE" { Write-Verbose $formattedMessage break; } "WARN" { Write-Warning $formattedMessage break; } "ERROR" { Write-Error $formattedMessage break; } } } Function Confirm-GetClusterNodeIsAvailable { return ( (Get-Command Get-ClusterNode ` -ErrorAction SilentlyContinue) -and ` (Get-ClusterNode ` -ErrorAction SilentlyContinue ` -ErrorVariable clusterNodeError ` -WarningAction SilentlyContinue ` -WarningVariable clusterNodeWarning) -and ` $null -eq $clusterNodeError[0] -and ` $null -eq $clusterNodeWarning[0] ) } Function Get-ClusterNodesLocal { [CmdletBinding()] Param() $functionName = $MyInvocation.MyCommand.Name Write-Log "$functionName : Fetching cluster node(s)." $clusterNodes = @() if (Confirm-GetClusterNodeIsAvailable) { $clusterNodes = (Get-ClusterNode).Name } else { $clusterNodes += $env:COMPUTERNAME } Write-Log "$functionName : Cluster node(s) = $($clusterNodes -join ',')." return $clusterNodes } Function Get-ArcAgentInfo { [CmdletBinding()] Param() $functionName = $MyInvocation.MyCommand.Name try { Write-Log "$functionName : Fetching required details from Arc agent." $arcShow = & "$($env:ProgramW6432)\AzureConnectedMachineAgent\azcmagent.exe" show -j | ConvertFrom-Json $requiredArcAgentInfo = [Ordered] @{ ResourceGroupName = $arcShow.resourceGroup SubscriptionId = $arcShow.subscriptionId TenantId = $arcShow.tenantId CloudName = $arcShow.cloud Location = $arcShow.location } $missingDetails = @() foreach ($key in $requiredArcAgentInfo.Keys) { if ([System.String]::IsNullOrEmpty($requiredArcAgentInfo[$key])) { $missingDetails += $key } } if ($missingDetails.Count -gt 0) { Write-Log "$functionName : The script cannot proceed as the required registration detail(s) are missing (i.e. $($missingDetails -join ',')) from the Arc agent." -Level ERROR } Write-Log "$functionName : Arc agent info = $($requiredArcAgentInfo | ConvertTo-Json -Compress)" return $requiredArcAgentInfo } catch { $exceptionDetails = Get-ExceptionDetails $_ Write-Log "$functionName : Exception occurred while fetching required details from Arc agent. Exception : $exceptionDetails." -Level ERROR } } Function Install-RequiredPackagesAndModules { [CmdletBinding()] Param() $functionName = $MyInvocation.MyCommand.Name Write-Log "$functionName : Installing NuGet package provider." Install-PackageProvider -Name NuGet -Force -Confirm:$false Write-Log "$functionName : Installing PowershellGet." Install-Module -Name PowershellGet -Force -Confirm:$false -SkipPublisherCheck $modulesToInstall = @( @{ Name = 'Az.Accounts' Version = '2.10.4' }, @{ Name = 'Az.ConnectedMachine' Version = '0.4.1' } ) foreach ($module in $modulesToInstall) { $mName = $module.Name $mVersion = $module.Version $isModuleInstalled = $false Write-Log "$functionName : Checking whether module ($mName) with version ($mVersion) is already present. If not then install or update to the respective version." $existingModule = Get-Module -Name $mName -ListAvailable | Sort-Object -Property Version -Descending | Microsoft.PowerShell.Utility\Select-Object -First 1 if ([System.String]::IsNullOrEmpty($existingModule) -or ($existingModule.Version -lt $mVersion)) { Write-Log "$functionName : Installing or updating module ($mName) with version ($mVersion)." Write-Log "$functionName : $(Install-Module $mName -RequiredVersion $mVersion -Force -AllowClobber -Verbose)" -Level VERBOSE Write-Log "$functionName : Importing module ($mName) with version ($mVersion)." Write-Log "$functionName : $(Import-Module $mName -RequiredVersion $mVersion -Force -Verbose)" -Level VERBOSE $isModuleInstalled = $true } else { Write-Log "$functionName : Module ($mName) with version ($mVersion) already exists." } if ($isModuleInstalled) { Write-Log "$functionName : Validating whether module ($mName) is installed with correct version ($mVersion) or not." $installedModule = Get-Module -Name $mName -ListAvailable | Sort-Object -Property Version -Descending | Microsoft.PowerShell.Utility\Select-Object -First 1 if ([System.String]::IsNullOrEmpty($installedModule) -or ($installedModule.Version -lt $mVersion)) { Write-Log "$functionName : Failed to install or update module ($mName) with version ($mVersion)." ` -Level ERROR } else { Write-Log "$functionName : Successfully installed and imported module ($mName) with version ($mVersion)." } } } } #endregion Helper Functions #region Main try { Write-Log "$functionName : Starting uninstallation of Observability extension." $arcAgentInfo = Get-ArcAgentInfo Install-RequiredPackagesAndModules Write-Log "$functionName : Authenticate user's identity." Connect-AzAccount ` -SubscriptionId $arcAgentInfo.SubscriptionId ` -TenantId $arcAgentInfo.TenantId ` -DeviceCode ` -ErrorAction Stop ` | Out-Null Write-Log "$functionName : User authenticated successfully." $clusterNodes = Get-ClusterNodesLocal $exceptionMessage = [System.String]::Empty foreach ($clusterNode in $clusterNodes) { Write-Log "$functionName : Checking whether extension already exists on $clusterNode or not." $extensionExistsResult = Get-AzConnectedMachineExtension ` -Name $customExtName ` -ResourceGroupName $arcAgentInfo.ResourceGroupName ` -MachineName $clusterNode ` -ErrorAction SilentlyContinue if ($null -eq $extensionExistsResult) { $exceptionMessage += "ExtensionExistsResult = $extensionExistsResult`n" Write-Log "$functionName : Extension does not exists on node $clusterNode. Skipping uninstallation." continue } else { Write-Log "$functionName : Extension found on node $clusterNode." } Write-Log "$functionName : Uninstalling extension from node $clusterNode. This might take a while..." Remove-AzConnectedMachineExtension ` -Name $customExtName ` -ResourceGroupName $arcAgentInfo.ResourceGroupName ` -MachineName $clusterNode ` | Out-Null Write-Log "$functionName : Checking whether extension is uninstalled from node $clusterNode or not." $uninstallationCheckResult = Get-AzConnectedMachineExtension ` -Name $customExtName ` -ResourceGroupName $arcAgentInfo.ResourceGroupName ` -MachineName $clusterNode ` -ErrorAction SilentlyContinue if ($null -ne $uninstallationCheckResult) { $exceptionMessage += "UninstallationCheckResult = $uninstallationCheckResult`n" Write-Log "$functionName : Extension uninstallation failed on node $clusterNode with exception $uninstallationCheckResult." -Level ERROR continue } else { Write-Log "$functionName : Observability extension uninstallation succeeded on node $clusterNode." } } if ([System.String]::IsNullOrEmpty($exceptionMessage) -and ` [System.String]::IsNullOrWhiteSpace($exceptionMessage)) { Write-Log "$functionName : Successfully uninstalled Observability extension from all the cluster nodes." } } catch { $exceptionDetails = Get-ExceptionDetails -ErrorObject $_ Write-Log "$functionName : Observability extension uninstallation failed due to unhandled exception: $exceptionDetails" -Level ERROR } #endregion Main # SIG # Begin signature block # MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDcDFNqgPEj5/+U # LG3iKXkB5oJrMRj9vzj+wTVQd8JuIqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGN0AZlscMEbcSFZhjzG5XBG # utXqrgmsC1ldo3YGuhulMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAsmNvJymeIESQXScEHsxDG+eZeimRe4+dLc++gwAFrSQf2JErsT0p4NaG # 6E0Igl0UN3EQ6QVbOxnDP7e+5F69j8VsnplpnLENmrI5dyOFZC/sv9/PPRwIo2ED # gGbDez5kCAUAMduPhHdR8yz3BUV8qX/fnGZK2G1qXkpM0EqK7O+Oq92HUXMOEJoo # ieXmKANcGAywluBm0QDCbKbDj6scOEfDMtgSJMy+M+q8Cs7ukujBSsfZXajiUpEx # SLzOrzvylL/A4uTKp2TDlzmdKOuuveFX2VyYh0sUcOqhaI3N6yg8Waa8F1tqJ49r # p/eTUM4f7KEvllsN4FCf/eFNvCzakqGCFygwghckBgorBgEEAYI3AwMBMYIXFDCC # FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq # hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCLrmgHcnSrWF+KPKnqSo6pXPiqOZBat1jTyv8OTZhr/wIGZjOp4bJL # GBIyMDI0MDUxNjE4NDUxMS4zOFowBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046 # OEQ0MS00QkY3LUIzQjcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl # cnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAePfvZuaHGiDIgABAAAB4zANBgkq # hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEw # MTIxOTA3MjlaFw0yNTAxMTAxOTA3MjlaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjhENDEtNEJG # Ny1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC # IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvqQNaB5Gn5/FIFQPo3/K4Qml # eCDMF40bkoHwz0BshZ4SiQmA6CGUyDwmaqQ2wHhaXU0RdHtwvq+U8KxYYsyHKqax # xC7fr/yHZvHpNTgzx1VkR3pXhT6X2Cm175UX3WQ4jfl86onp5AMzBIFDlz0SU8VS # KNMDvNXtjk9FitLgUv2nj3hOJ0KkEQfk3oA7m7zA0D+Mo73hmR+OC7uwsXxJR2tz # UZE0STYX3UvenFH7fYWy5BNmLyGq2sWkQ5HFvJKCJAE/dwft8+V43U3KeExF/pPt # cLUvQ9HIrL0xnpMFau7Yd5aK+TEi57WctBv87+fSPZBV3jZl/QCtcH9WrniBDwki # 9QfRxu/JYzw+iaEWLqrYXuF7jeOGvHK+fVeLWnAc5WxsfbpjEMpNbGXbSF9At3PP # hFVOjxwVEx1ALGUqRKehw9ap9X/gfkA9I9eTSvwJz9wya9reDgS+6kXgSttI7RQ2 # cJG/tQPGVIaLCIaSafLneaq0Bns0t4+EW3B/GnoBMiiOXwleOvf5udBZQIMJ3k5q # nnh8Z4ZhTwrE6iGbPrTgGBPXh7exFYAGlb6hdhILIVDdJlDf8s1NVvL0Q2y4SHZQ # hApZTuW/tyGsGscIPDSMz5bA6NhRLtjEwCFpLI5qGlu50Au9FRelCEQsWg7q07H/ # rqHOqCNJM4Rjem7joEUCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSxrg1mvjUVt6Fn # xj56nabZiJipAzAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV # HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny # bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI # KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy # MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI # MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAt76bLqnU08wRbW3v # RrxjaEbGPqyINK6UYCzhTGaR/PEwCJziPT4ZM9sfGTX3eZDQVE9r121tFtp7NXQY # uQSxRZMYXa0/pawN2Xn+UPjBRDvoCsU56dwKkrmy8TSw7QXKGskdnEwsI5yW93q8 # Ag86RkBiKEEf9FdzHNuKWI4Kv//fDtESewu46n/u+VckCwbOYl6wE//QRGrGMq50 # 9a4EbP+p1GUm06Xme/01mTIuKDgPmHL2nYRzXNqi2IuIecn2aWwkRxQOFiPw+dic # mOOwLG/7InNqjZpQeIhDMxsWr4zTxzy4ER/6zfthtlDtcAXHB7YRUkBTClaOa0nd # vfNJZMyYVa6cWvZouTq9V5LS7UzIR8S/7RsOT43eOawLBsuQz0VoOLurYe1SffPq # TsCcRNzbx0C8t/+KipStVhPAGttEfhdUUS9ohD6Lt6wNCJxZbV0IMD8nfE6gIQJX # rzrXWOuJqN91WDyjRan4UKDkIBS2yWA4W6JhQuBzGerOSY/aLnxkRrSubgtnKYcH # OwgxTTIya5WYCRjFt0QOLleqVki6k+mqYPr98uMPi5vRIQS206mDSenStr8w0J+/ # +1WEm3PnCCIQgpf6zhqRrAt9j7XrEMHrg2bQegaz8bLzbe6UibgbKtRyk1nGde8T # o5kyMj9XUCBICDxT+F4xa5lNZVQwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ # AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0 # ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1 # V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9 # alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv # Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928 # jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t # pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe # HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o # ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C # vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug # poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps # xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C # AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE # FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT # NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o # dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD # AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW # y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t # aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt # MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y # My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc # FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT # Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j # VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3 # +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR # sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw # ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b # RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx # aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX # HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0 # W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0 # HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu # ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjhE # NDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2 # aWNloiMKAQEwBwYFKw4DAhoDFQA9iJe7w5FDiG8py4TsYrQI6DFaeqCBgzCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA # 6fCcCDAiGA8yMDI0MDUxNjIyNTE1MloYDzIwMjQwNTE3MjI1MTUyWjB0MDoGCisG # AQQBhFkKBAExLDAqMAoCBQDp8JwIAgEAMAcCAQACAheoMAcCAQACAhGBMAoCBQDp # 8e2IAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH # oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAX15ItItAqKklNNNpjhzQ # XW+UJAAzIbpC3SMvTYrfrrXh8eBXwHQStH+JceU1Fl0VMjbvzaywb8PoKKMncAdP # Fp+iCACuQEw2Iu5d2olWY+9WqspEyyCGa/ezDkLWFS9qjkNshERlmm2JzVZDGriO # 6gK3aMsIUmvqbn/FDvLj8vUxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T # dGFtcCBQQ0EgMjAxMAITMwAAAePfvZuaHGiDIgABAAAB4zANBglghkgBZQMEAgEF # AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi # BCApJ/9QUYMXaQFt15Xh6XFLgJjCVJdcK2J+dxZcOjDO4zCB+gYLKoZIhvcNAQkQ # Ai8xgeowgecwgeQwgb0EIDPUI6vlsP5k90SBCNa9wha4MlxBt2Crw12PTHIy5iYq # MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHj372b # mhxogyIAAQAAAeMwIgQg1JVGdS5gF5mozhPBlg/5tZeZCFfw+yCgeJ8+b01VH3ww # DQYJKoZIhvcNAQELBQAEggIAevEBKuCvHKbpRhLG4+pBTuQMvngD/w06ZkQ0DfOb # RwqcAkzATPqxlFrSDsyCGuoApRxNbCFtyAKjTbrcICmMMQtz/8NzM7QMaJn08hXJ # 9H5kukO9xBdRP0/WXKB5Qg8k0Rm7F9j5qe7LWuQabv5SWyqrUuD/qpnmnM8sYHyJ # teRx2K70cGQs0UIHnS+xA9tiMXi17Fk0/1+rl0PjjsKGXVsvrP1pbFw5mrlzWPbj # H8sNfjUhkcvvsczUtywThnkqXQf8oA9fH/KDcAU4dVxG3pp/HOdo/PWn+XYniro9 # lGQ2/X718hvI+WL+UOUbFtzCyHB2T/t9XPdm45R0+aLB0TkxnEy/KxplpBt+K5Kh # kYWOrzgwgtN7AwgWksMSEC9wEUqo0vluLqRBS4UYecDrm62Z7Uia3zvwORj+tVLn # B2w0+FGaCXXw6CDMBZch1yMYV7SabDoy6nwtdzq/T1UyCKm/9NPM6wM6EmSh123t # YWjLs0o8DD87bjp24YIWy6S6x6yl84Evf+gHz0MPJEiwHib9uzWqQXRMpCInKc4R # yTjkUQdvI1jbv7h6/IMKQNgrEgjko/mJnKzjgKe2cfhnJl6ON9g31OQyf6tsqmTA # 7pCrUhiW/Jfk9rHzPF2kUvrHdkO5ht/AkEUwpHZxwauE0LVSGpRIDp+xlzXlmkQJ # SCk= # SIG # End signature block
combined_dataset/train/non-malicious/sample_11_77.ps1
sample_11_77.ps1
ConvertFrom-StringData @' id_clusterdependencyreport=Cluster resource dependency report id_clusterdependencyreportdesc1=Obtaining cluster resource dependency report id_clusterdependencyreportdesc=Obtaining cluster resource dependency report from group %GroupName% '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDX84ypwX9CpeTj # WGHsbvyfRHJaPuGRmPzpN7q0QNbGcaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAds # XCkKMReSMdnLnz4zFgSH6Xh7weNTAwVBhOoRXsgOMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAeSEuBOaIeus7iX8tkXVA49A/yixwbMgy3ASI # ghwed52tYKTPniZBRlGEMmYzQvyqoSJApiJkvXuVz+L8Kq3zGa7NwiWOGzmgjz0b # JYgmXmgENv3stI7FWhKFBO/CjPVGylbHZJVJb/hH9ANN3Vb7TsO71P2wXVkRdAaf # wZ3fv6uB4ksrpNIne5r5LtCIbpBna6RL4zN3MPS+HFQ9i3PgM1KkdyQjXzY1mTRu # G29TgzI/+2u9Apuh/vfEantvRAyuu3KZhx21lb4pnKbFG+LEQqNaiVjNNxibal1p # Y/4lEyNPyjYbhsMV3Dqo88VST1CeZlz3Hk7LpkPxVw91OctDrKGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDTrSGYZXBhbsknL+mD1DnwB3eEmJEZVyVN # RhI+M1gJ0wIGZusiCs6bGBMyMDI0MTAyODExNDA0MC44NDRaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg # dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3 # k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW # 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8 # U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH # TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn # 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE # 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX # D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI # vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ # QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G # qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb # QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL # zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0 # G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt # qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b # a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB # VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM # H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N # iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG # 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V # VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB # jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0 # MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA # AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd # uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0 # GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578 # OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI # /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN # ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgVyt16uf3vh8Za1ghxe2l6Yt4fFgOglT8ov3ZpMhXcfAwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So # IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b # gvEVMA0GCSqGSIb3DQEBCwUABIICAJQk2RlniLQwnt+3JYQA/vN7NHAPXfv3aEkE # ozgSCYPoPHv/qmseiaAhhzHgp/NcG2zrlilJjfpGdXqU6fR6dCSw11lhjOFfRG7q # 5gXZ/k4jKYeu2Q0Fm7WWKopgn4f/Gtp49HRgwexnOVdE+g8d2pTf6O2FbxtuIN74 # tpfBpZz0z1L4FwOwnL/2+iBMJX54k74+IyNkck1XmIc0POPcITJfhwG81PneaLgV # 9zwa9Fr2LYljbwKp+Q9hlapWE+RNgKxozKilB0ASRxaDoBDfbWPOd+zEeLqTYJ6h # Qge6r1V7EkqspgP9OCLpEAYfZYV6b233ra9BWaMZTGsaClNjFfO4UnJkhg5hA2WT # WunPTe1GldzBeXuaeEyhJpNlSO+baw4UANo0L7wgs1POWJMCwgGH6PIm2cupguAk # 8X8HVar0SwweKFpQZD+JUqUJymEQ4nblCuIvr7x9YXuk8HUiIh9Zcp5fRQCAhPZy # rj8T8iwaFpyV6N1CgIZ3TC9oaMvk5AGbhlk8iNXVnnu21JpXx0rBVwkNKMd79Q7a # P5GYUbPxlRL3Evnmp8QKhF2fieuAW6/GV+mtWfpJMCfWR8Ql1LfOesac1wYgvFXs # deLLv5+hFgnvQ3HyP3L86aBEkjEz1ZOafZ7tASCAHe01L/azUmScK9GCzUEvyXYv # LAE6Wpkj # SIG # End signature block
combined_dataset/train/non-malicious/210.ps1
210.ps1
function Set-RemoteDesktop { [CmdletBinding()] PARAM ( [String[]]$ComputerName = $env:COMPUTERNAME, [Parameter(Mandatory = $true)] [Boolean]$Enable ) PROCESS { FOREACH ($Computer in $ComputerName) { TRY { IF (Test-Connection -ComputerName $Computer -Count 1 -Quiet) { $regKey = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey([Microsoft.Win32.RegistryHive]::LocalMachine, $Computer) $regKey = $regKey.OpenSubKey("SYSTEM\\CurrentControlSet\\Control\\Terminal Server", $True) IF ($Enable){$regkey.SetValue("fDenyTSConnections", 0)} ELSE { $regkey.SetValue("fDenyTSConnections", 1)} $regKey.flush() $regKey.Close() } } CATCH { $Error[0].Exception.Message } } } }
combined_dataset/train/non-malicious/815.ps1
815.ps1
. ./ReferenceFileE.ps1 . "$PSScriptRoot/ReferenceFileE.ps1" . "${PSScriptRoot}/ReferenceFileE.ps1" . './ReferenceFileE.ps1' . "./ReferenceFileE.ps1" . .\ReferenceFileE.ps1 . '.\ReferenceFileE.ps1' . ".\ReferenceFileE.ps1" . ReferenceFileE.ps1 . 'ReferenceFileE.ps1' . "ReferenceFileE.ps1" . ./dir/../ReferenceFileE.ps1 . ./invalidfile.ps1 . "" . $someVar
combined_dataset/train/non-malicious/2938.ps1
2938.ps1
BuildSetup { $script:sequence += "executing build setup;" } Task default -depends Test-Results Task Test-Results -depends Compile, Test, Deploy { [string]$expected = "executing build setup;Compiling;Testing;Deploying" if ($script:sequence -ne $expected) { throw "Expected sequence '$expected', but was actually '$script:sequence'" } } Task Compile { $script:sequence += "Compiling;" } Task Test -depends Compile { $script:sequence += "Testing;" } Task Deploy -depends Test { $script:sequence += "Deploying" }
combined_dataset/train/non-malicious/sample_9_26.ps1
sample_9_26.ps1
ConvertFrom-StringData @' id_etltraceenable=Enabling %Component% Event Trace Log id_etltraceenabledesc=Enabling Event Trace Log for %Component% id_etltracereprotitle=Please click 'Next' to start collecting data id_etltracereprodescription=Please click 'Next' to start collecting information. You will be prompted to reproduce the problem. id_etltracestoptitle=Please reproduce the problem now id_etltracestopdescription=Troubleshooter is now collecting information. Please go ahead and reproduce the problem. Click 'Next' to stop data collection and upload information back to Microsoft Support. id_etltracestopping=Stopping %Component% Event Trace Log id_etltracestoppingdesc=Stopping Event Trace Log for %Component% id_etltracecollecting=Collecting %Component% Event Trace Log file id_etltracecollectingdesc=Collecting Event Trace Log file for %Component% '@ # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDmdIcLcaD2N+VP # 0dn5lmuonxWSetn1Z7F6DvpPKgBnYqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICcqphVDu3SAOSdOR5BthZ6i # iBHyS4V/L68nQGWDHrnHMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAjXE19eygD0/WSONfSjHwWErTNco8UVKpDtHi6NHOssPdIa4UQZa9iZN3 # u9ueffLKqiZqMUs1LNbmd9c+hIrjSLv5VEdZTTaJw4O4aWQiaGMBg46uJK2HRIR3 # gv1BeuHVNWoo7nuhLtnVzOjy/mDgUiWY6fD9MZ2zg0fBK/NeQDEIV4IyyXG9imzb # jbfnTrfIkEnh/BNsBvoWPO4OldZzmIAjLhAO5oNjFMSX34I6PIVRUjyduX6ZYY8b # HjOVBaaklMxPUgo1ojI+8IdtFBASjkOg4ENNAFJFC7IaQX02X+v3UUwGKSUgHNWk # 94A9rWZyyw3ywCra4x2bKMAGn/iJkKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAgAHUc6iq7NE6oWok3W+WYGwtOfguW6nVs+fvXrAek8QIGZxqDjw+Z # GBMyMDI0MTAyODExNDA0NS4zMjZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4 # EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob # FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs # 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC # z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I # U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU # qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR # BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO # oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ # sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX # OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh # twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG # Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM # Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe # ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV # xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI # bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM # fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF # C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO # Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x # 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT # 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu # Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC # KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smfDzAiGA8yMDI0MTAyODA1MjYz # OVoYDzIwMjQxMDI5MDUyNjM5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZ8P # AgEAMAoCAQACAiYaAgH/MAcCAQACAhM/MAoCBQDqyvCPAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAEy6prjM5nn6m2wPFDV2l7yQLdf34GsB8soqvapDL1eR # rPtWitnTEp7vhoVzRz9hYUjbNVz41gTK6QLMwnryax54lVtv7R+ycSEZGir7KV1C # Tjp2r0eaAAM8e5NelaIbG0kXU0fBms51FkcYQirRI4P+80FYKXx5iFqcvs69kQXm # xZfJwGOYkJtgvPMgNqBd0cL6UDTHo3N5w5H9YuolMSwEh/jYgYnNOS/PJdyHj/Fy # fhCJzSN42Eqw1jMZIaoWpXv13Pm5X9rEhWE15EJiSSQFig7Ouj24B3wbU2l1uyvo # 5g+dLcWpqjjoZU4fXoFOEyXyKBH7s1NAAm4GzqtlwfwxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB # 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCGDl3dKa3U47CtAxhJ/KRvIbHnlZd6AA+gFTCVqCNy # QzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q # FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgR3SpcmzGLGE6OkDlhx79aiWy # SoOiH8fVebPajToioVAwDQYJKoZIhvcNAQELBQAEggIAhZwHMKpH0vcLft09Utc6 # L0W+dsJp2sFdeypybSM3+iR2PWwL71iZrP6oEJggcIRZ4dOVRjMg1l4jDH1tNowf # 0CmMWrLfJjcwTq2gPl9cOExXt3CwaG313BAyP9CGyGV5oJwDPfD/CQ2GASqr9WLS # /z3KhWtaxOqklk8hdJZVyBWRHpOR0NAHQ+9jKfaQE3GG+WD9ugiTWc/kDv2wBQbk # tuRpMGZqSLWVMQ124/TNoaPEVMHA7adXlAf+WYwA8I+7Yu+m1BQSsIFYgNJMIlK5 # Ml0teoaSgl2+y/kzVt/d+vsNw08NYlALAMp/dH52NM2ao+E6eiitmosKuR7hYF0j # Sw0zM+Q98tyKXE3DouF/KFDhmWD8LDg0oerKaeHLN4c9pMvjxnYbh9Y84L5bNC03 # oocMqLZRqC2kf+Eaf9fOHfG/dgBr1GPdVkIxU/3efL5k3XTP2UhjuKCJvnhEBAMC # 1fmFZAMHLRCCnsevoAOVSkf9mjIdfhBLCTp8YNaOjG0RJSwLep3/+x5dAMz7c5iq # pBqPOyjxBjVwKJfScZyef98r/z6uKtLy08j7OXKuEPOyXjMrVWRJdXqzW6A57YzO # umA0/IQ81hLnfS09m6/UA3Gmrmes2PX5kmFpg+oY/S3s89RiNqN8CSc96nqaXiV8 # NiXMd58x8ypuQaBCMsCe8Cw= # SIG # End signature block
combined_dataset/train/non-malicious/sample_59_45.ps1
sample_59_45.ps1
# # Module manifest for module 'OCI.PSModules.Certificates' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Certificates.dll' # Version number of this module. ModuleVersion = '86.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2be0ad0a-0889-41e0-b5ab-448d9fc6f7c4' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Certificates Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Certificates.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCICertificatesCaBundle', 'Get-OCICertificatesCertificateAuthorityBundle', 'Get-OCICertificatesCertificateAuthorityBundleVersionsList', 'Get-OCICertificatesCertificateBundle', 'Get-OCICertificatesCertificateBundleVersionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Certificates' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_43_44.ps1
sample_43_44.ps1
# # Copyright (c) Microsoft Corporation. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. # ConvertFrom-StringData @' ###PSLOC StartGetPackageSource=Begin invoking Get-packageSource {0} StartRegisterPackageSource=Begin invoking Register-Packagesource {0} StartUnRegisterPackageSource=Begin invoking UnRegister-Packagesource {0} PackageSourceFound=Package source '{0}' found PackageSourceNotFound=Package source '{0}' not found RegisteredSuccess=Successfully registered the package source {0} UnRegisteredSuccess=Successfully unregistered the package source {0} RegisterFailed=Failed to register the package source {0}. Message:{1} UnRegisterFailed=Failed to register the package source {0}. Message:{1} InDesiredState=Resource {0} is in the desired state. Required Ensure is {1} and actual Ensure is {2} NotInDesiredState=Resource {0} is not in the desired state. Required Ensure is {1} and actual Ensure is {2} NotInDesiredStateDuetoLocationMismatch=Resource {0} is not in the desired state. Required location is {1} and registered is {2} NotInDesiredStateDuetoPolicyMismatch=Resource {0} is not in the desired state. Required installation policy is {1} and registered is {2} InstallationPolicyWarning=Begin registering '{0}' to source location '{1}' with '{2}' policy" ###PSLOC '@ # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDFuym1v/NtoXxJ # gjHj6HUj0SEsN/GPakQw8oc6hd5e16CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIATZA7LJPyCoN3GjbGxrPSVp # T74sycop1NpRf9jCRv8CMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAZIi0sox2XVUUp4hiLY/mmnxFTT9MFsMC9nzG6pROu4HW4uxbEf71KCSg # PRV7l3AbwMGaeP/VsG8Qswq2SVfUTt7/1bqhBay7Ic6cnPgGeaP1bTQD2A558Nrm # 7UMlqx9LA+KidehgAS26gV5mxwXs4f+Yn15wzr8HBIZF9ptnSqsdoShpiPYezyGe # UhxvBa8O9G9JJ4dwviKza+v2q92V3+XcJYz9HpnlHDVrIz+yFeANElrcy+cxlTBd # BphA7PFIN0XiscbuyMi4haRQHau2YJ35pdmXUkMFqIRoRxs6V3moh2hwzDSgxxQ6 # r6e1lj5Oz8NNixsYRF2YdCjyQcCRY6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD6OzrgUPVT6KEPTNJ457Q+67nVfV74NQwELOqlDNYg4gIGZbwT8qEv # GBMyMDI0MDIxNDIxMDAzMC43NzRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QABAAAB6zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaFBuYbNc7hSKmktvJ15NrB # /DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB3huvv91fZuUugIsKTnAv # g2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG4cxKgcDAinihT8xroJWV # ATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARuCo3TiRGjM2Lp4piT2lD5 # hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojTdFLL5vJ9IAogWf3XAu3d # 7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrCNL+Tmi/jalRto/J6bh4f # PhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TYjMPbYqG8y5xz+gI/SFyj # +aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1Xb6hM5HIWA0jEAZhKEyd5 # hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6rUhudfI7k8L9KKCEufRb # K5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjoW3qs7JRMZmH9fkFkMzb6 # YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidVtNqiZeWWpVjfavR+Jj/J # OQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu4qT9O5jT2B+qAerhMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VWZP3+W87c/QbdbWK0sOt9 # Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8WHgDOvbwqdqsLUaM4Nre # rtI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd5Bg3CWknV3uvVau14F55 # ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbeI2IDqRxC4xBbRiNQ+1qH # XDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXioLVYo/2Hkyow6dI7uULJb # KxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1RVHcQtkUE7W9zxZqZ6/jP # maojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawpazLBv997LRB0ZObNckJY # yQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+9dy6nmcCrVcOqbQHX7Zr # 8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50w+JoTxISQq7vBij2nitA # sSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvDZo365vLOozmQOe/Z+pu4 # vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltUdsi3HjNnieuE72fT4eWh # xtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCA # Bol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XcLmTAiGA8yMDI0MDIxNDA5NTEy # MVoYDzIwMjQwMjE1MDk1MTIxWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdwuZ # AgEAMAoCAQACAgqBAgH/MAcCAQACAhO7MAoCBQDpeF0ZAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAHCVIOYo4NE8uwsC6xDqkKSRNR9Bp5Qoz/0WtWqNOdBD # LO2p7E6AO2tYmTSwHKzMXVQLiwvvI+yYn0uuIQDOz8SEaVkbwEvKGz1aFRFQMhgN # CxJ7yIg7A9DUG668jQ1/8GvCIhP2bPLy4kbm50VFuIFSJ8cwfEoVDPnh/EmefDb4 # 8FleQ6M7NUhadUjPca8HSh2/bmBe62BC9EnRMv1bqrg6QznqJwwofiDGsP5EQgU1 # MigjKCXqTFVod77TdOh2bSsvxrFvEjL/ohDS/YVZAgtiWqPZ9v35vifIRwCuV0NA # wgeXYow7YQMyOdS1t1EKtKSuqDmyXsCzvkcMl6JacxMxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB # 6zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBAAZSrTmGGs/1cspScMPGngRSkX0NBORzHpnGTVeN9 # zjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63a75faQPhf8SBDTtk2DSU # gIbdizXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQgX+Rd/J7dZbOx78m4m4Vj6B+l # 1Fu9wBW4uDPzpmZqjv4wDQYJKoZIhvcNAQELBQAEggIAi83LFHHJJd/l77LqrXsH # MIfLeP0fVulZyVz/XLYszMChRR1msGMPQZ8UXoK60Aa8Xw+qW3xmhbs+ji98KXF6 # dbQ/ZLZRmKrcs9m86uKaodmE4iSXRqJ2GChiap4hsZuo9b8o9Ck3pW3D+CkLI3oC # zdMlqJhxP2M89/9ztLlDxSpYfOayeJhu6xyk6BlYq4/NQxGge65538ffxoLucR28 # IQNXKeNLiAqOWE5g95tLqojsPuYSCz9u78I6tBHDTrOo1eyHOF43uM9BRhX/LjRe # LPyr8z0iiweD5IXlYfNvh3Sfdc+wzQLaeZHmCTf3qrpn3RfqiHdGNvZIowYwt7yM # 96dYzaSGyH5rVsNsBDTD6zVcQjwO6HPFUK5eeh9RLXkzHdMTYc5WEhX+IzZHMaZw # fFBqu7sxrQ0ZoyB6m4kx5qQioAUTEdrnbD8woxyEqb4qf42euLPPWrgNwE9wY08X # 6ST+mTRXpIwUzj+XGOzl/nNs+mezB12N32mYS99LLhxzXPPqCYXOSMrwYAv2c0ir # KRZqbt0b7+BZa4xzMHl8HY70RNFcTkfqegw4Dnmih06DUKc8P+O0qunLePeFswcn # UGvrXXGppWIf0rnYl/xsN/+GXPXGzkZSn3f7bqhjMUAkWpQgeBo3SlgNGOehjwvC # GYCstHCwblKv3F+PoVop5+g= # SIG # End signature block
combined_dataset/train/non-malicious/2753.ps1
2753.ps1
[CmdletBinding()] Param( [Parameter(Mandatory=$False,Position=0)] [Int]$ProcId=$pid ) $datestr = (Get-Date -Format "yyyyMMddHHmmss") $outfile = "${pwd}\" + ($env:COMPUTERNAME) + "_PId_" + ($pid) + "_${datestr}.dmp" $obj = "" | Select-Object Path,PId,Base64EncodedGzippedBytes $obj.PId = $ProcId $obj.ProcessName = (Get-Process -Id $ProcId).Path if (Test-Path "$env:SystemRoot\Procdump.exe") { $Suppress = & $env:SystemRoot\Procdump.exe /accepteula $ProcId $outfile 2> $null $File = ls $outfile Try { $memFile = New-Object System.IO.MemoryStream (,[System.IO.File]::ReadAllBytes($File)) $memStrm = New-Object System.IO.MemoryStream $gzStrm = New-Object System.IO.Compression.GZipStream $memStrm, ([System.IO.Compression.CompressionMode]::Compress) $gzStrm.Write($memFile.ToArray(), 0, $File.Length) $gzStrm.Close() $gzStrm.Dispose() $obj.Base64EncodedGzippedBytes = [System.Convert]::ToBase64String($memStrm.ToArray()) } Catch { Write-Error ("Caught Exception: {0}." -f $_) } Finally { Remove-Item $File } $obj }
combined_dataset/train/non-malicious/sample_8_78.ps1
sample_8_78.ps1
# # Module manifest for module 'OCI.PSModules.Mysql' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Mysql.dll' # Version number of this module. ModuleVersion = '93.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ad8c5447-7619-4d20-8318-cfb7688ec98d' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Mysql Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '93.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Mysql.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIMysqlHeatWaveCluster', 'Copy-OCIMysqlBackup', 'Get-OCIMysqlBackup', 'Get-OCIMysqlBackupsList', 'Get-OCIMysqlChannel', 'Get-OCIMysqlChannelsList', 'Get-OCIMysqlConfiguration', 'Get-OCIMysqlConfigurationsList', 'Get-OCIMysqlDbSystem', 'Get-OCIMysqlDbSystemsList', 'Get-OCIMysqlHeatWaveCluster', 'Get-OCIMysqlHeatWaveClusterMemoryEstimate', 'Get-OCIMysqlReplica', 'Get-OCIMysqlReplicasList', 'Get-OCIMysqlShapesList', 'Get-OCIMysqlVersionsList', 'Get-OCIMysqlWorkRequest', 'Get-OCIMysqlWorkRequestErrorsList', 'Get-OCIMysqlWorkRequestLogsList', 'Get-OCIMysqlWorkRequestsList', 'Invoke-OCIMysqlResumeChannel', 'Move-OCIMysqlBackupCompartment', 'New-OCIMysqlBackup', 'New-OCIMysqlChannel', 'New-OCIMysqlConfiguration', 'New-OCIMysqlDbSystem', 'New-OCIMysqlHeatWaveClusterMemoryEstimate', 'New-OCIMysqlReplica', 'Remove-OCIMysqlBackup', 'Remove-OCIMysqlChannel', 'Remove-OCIMysqlConfiguration', 'Remove-OCIMysqlDbSystem', 'Remove-OCIMysqlHeatWaveCluster', 'Remove-OCIMysqlReplica', 'Reset-OCIMysqlChannel', 'Restart-OCIMysqlDbSystem', 'Restart-OCIMysqlHeatWaveCluster', 'Start-OCIMysqlDbSystem', 'Start-OCIMysqlHeatWaveCluster', 'Stop-OCIMysqlDbSystem', 'Stop-OCIMysqlHeatWaveCluster', 'Update-OCIMysqlBackup', 'Update-OCIMysqlChannel', 'Update-OCIMysqlConfiguration', 'Update-OCIMysqlDbSystem', 'Update-OCIMysqlHeatWaveCluster', 'Update-OCIMysqlReplica' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Mysql' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_50_2.ps1
sample_50_2.ps1
# # Module manifest for module 'OCI.PSModules.Oda' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Oda.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '040ef05d-6373-43bf-a0a9-67444099f906' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Oda Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Oda.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Export-OCIOdaDigitalAssistant', 'Export-OCIOdaSkill', 'Get-OCIOdaAuthenticationProvider', 'Get-OCIOdaAuthenticationProvidersList', 'Get-OCIOdaChannel', 'Get-OCIOdaChannelsList', 'Get-OCIOdaDigitalAssistant', 'Get-OCIOdaDigitalAssistantParameter', 'Get-OCIOdaDigitalAssistantParametersList', 'Get-OCIOdaDigitalAssistantsList', 'Get-OCIOdaImportedPackage', 'Get-OCIOdaImportedPackagesList', 'Get-OCIOdaInstance', 'Get-OCIOdaInstanceAttachment', 'Get-OCIOdaInstanceAttachmentsList', 'Get-OCIOdaInstancesList', 'Get-OCIOdaPackage', 'Get-OCIOdaPackagesList', 'Get-OCIOdaPrivateEndpoint', 'Get-OCIOdaPrivateEndpointAttachment', 'Get-OCIOdaPrivateEndpointAttachmentsList', 'Get-OCIOdaPrivateEndpointScanProxiesList', 'Get-OCIOdaPrivateEndpointScanProxy', 'Get-OCIOdaPrivateEndpointsList', 'Get-OCIOdaSkill', 'Get-OCIOdaSkillParameter', 'Get-OCIOdaSkillParametersList', 'Get-OCIOdaSkillsList', 'Get-OCIOdaTranslator', 'Get-OCIOdaTranslatorsList', 'Get-OCIOdaWorkRequest', 'Get-OCIOdaWorkRequestErrorsList', 'Get-OCIOdaWorkRequestLogsList', 'Get-OCIOdaWorkRequestsList', 'Import-OCIOdaBot', 'Invoke-OCIOdaBulkCreateSkillEntities', 'Invoke-OCIOdaCascadingDeleteSkillCustomEntities', 'Invoke-OCIOdaConfigureDigitalAssistantParameters', 'Invoke-OCIOdaPublishDigitalAssistant', 'Invoke-OCIOdaPublishSkill', 'Invoke-OCIOdaRotateChannelKeys', 'Invoke-OCIOdaTrainSkill', 'Move-OCIOdaInstanceCompartment', 'Move-OCIOdaPrivateEndpointCompartment', 'New-OCIOdaAuthenticationProvider', 'New-OCIOdaChannel', 'New-OCIOdaDigitalAssistant', 'New-OCIOdaImportedPackage', 'New-OCIOdaInstance', 'New-OCIOdaInstanceAttachment', 'New-OCIOdaPrivateEndpoint', 'New-OCIOdaPrivateEndpointAttachment', 'New-OCIOdaPrivateEndpointScanProxy', 'New-OCIOdaSkill', 'New-OCIOdaSkillParameter', 'New-OCIOdaTranslator', 'Remove-OCIOdaAuthenticationProvider', 'Remove-OCIOdaChannel', 'Remove-OCIOdaDigitalAssistant', 'Remove-OCIOdaImportedPackage', 'Remove-OCIOdaInstance', 'Remove-OCIOdaInstanceAttachment', 'Remove-OCIOdaPrivateEndpoint', 'Remove-OCIOdaPrivateEndpointAttachment', 'Remove-OCIOdaPrivateEndpointScanProxy', 'Remove-OCIOdaSkill', 'Remove-OCIOdaSkillParameter', 'Remove-OCIOdaTranslator', 'Start-OCIOdaChannel', 'Start-OCIOdaInstance', 'Stop-OCIOdaChannel', 'Stop-OCIOdaInstance', 'Update-OCIOdaAuthenticationProvider', 'Update-OCIOdaChannel', 'Update-OCIOdaDigitalAssistant', 'Update-OCIOdaDigitalAssistantParameter', 'Update-OCIOdaImportedPackage', 'Update-OCIOdaInstance', 'Update-OCIOdaInstanceAttachment', 'Update-OCIOdaPrivateEndpoint', 'Update-OCIOdaSkill', 'Update-OCIOdaSkillParameter', 'Update-OCIOdaTranslator' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Oda' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/MacroScopeParser.ps1
MacroScopeParser.ps1
#requires -version 2 #Chad Miller #http://www.sev17.com/ #Uses MacroScope/Antlr to parse SQL query for tables and table aliases #Download MacroScope from http://macroscope.sourceforge.net/ and compile from source #Or grab compiled assemblies from http://cid-ea42395138308430.skydrive.live.com/embedicon.aspx/Public/Blog/macroscopeParser.zip param ($commandText) #Assumes MacroScope and Antlr3 assemblies are in same directory add-type -Path $(Resolve-Path .\\Antlr3.Runtime.dll | Select-Object -ExpandProperty Path) add-type -Path $(Resolve-Path .\\MacroScope.dll | Select-Object -ExpandProperty Path) ####################### function Get-Table { param($table) $table if ($table.HasNext) { Get-Table $table.Next } } $sqlparser =[MacroScope.Factory]::CreateParser($commandText) $expression = $sqlparser.queryExpression() Get-Table $expression.From.Item | Select @{n='Name';e={$_.Source.Identifier}}, @{n='Alias';e={$_.Alias}}
combined_dataset/train/non-malicious/2754.ps1
2754.ps1
function Compute-FileHash { Param( [Parameter(Mandatory = $true, Position=1)] [string]$FilePath, [ValidateSet("MD5","SHA1","SHA256","SHA384","SHA512","RIPEMD160")] [string]$HashType = "MD5" ) switch ( $HashType.ToUpper() ) { "MD5" { $hash = [System.Security.Cryptography.MD5]::Create() } "SHA1" { $hash = [System.Security.Cryptography.SHA1]::Create() } "SHA256" { $hash = [System.Security.Cryptography.SHA256]::Create() } "SHA384" { $hash = [System.Security.Cryptography.SHA384]::Create() } "SHA512" { $hash = [System.Security.Cryptography.SHA512]::Create() } "RIPEMD160" { $hash = [System.Security.Cryptography.RIPEMD160]::Create() } default { "Invalid hash type selected." } } if (Test-Path $FilePath) { $FileName = Get-ChildItem -Force $FilePath | Select-Object -ExpandProperty Fullname $fileData = [System.IO.File]::ReadAllBytes($FileName) $HashBytes = $hash.ComputeHash($fileData) $PaddedHex = "" foreach($Byte in $HashBytes) { $ByteInHex = [String]::Format("{0:X}", $Byte) $PaddedHex += $ByteInHex.PadLeft(2,"0") } $PaddedHex } else { "$FilePath is invalid or locked." Write-Error -Message "$FilePath is invalid or locked." -Category InvalidArgument } } $hashtable = @{} Get-Process | % { $MM = $_.MainModule | Select-Object -ExpandProperty FileName $Modules = $($_.Modules | Select-Object -ExpandProperty FileName) $currPID = $_.Id foreach($Module in $Modules) { $o = "" | Select-Object Name, ParentPath, Hash, ProcessName, ProcPID, CreateUTC, LastAccessUTC, LastWriteUTC $o.Name = $Module.Substring($Module.LastIndexOf("\") + 1) $o.ParentPath = $Module.Substring(0, $Module.LastIndexOf("\")) if ($hashtable.get_item($Module)) { $o.Hash = $hashtable.get_item($Module) } else { $o.Hash = Compute-FileHash -FilePath $Module $hashtable.Add($Module, $o.Hash) } $o.ProcessName = ($MM.Split('\'))[-1] $o.ProcPID = $currPID $o.CreateUTC = (Get-Item -Force $Module).CreationTimeUtc $o.LastAccessUTC = (Get-Item -Force $Module).LastAccessTimeUtc $o.LastWriteUTC = (Get-Item -Force $Module).LastWriteTimeUtc $o } }
combined_dataset/train/non-malicious/sample_57_99.ps1
sample_57_99.ps1
<################################################### # # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> function Get-WinRMComputerName { <# .SYNOPSIS Returns the computer name associated with a WinRM failure, or null if the error message is not from a WinRM failure. #> [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string] $ErrorMessage ) $ErrorActionPreference = "Stop" if ([string]::IsNullOrWhiteSpace($ErrorMessage)) { return $null } $match = [System.Text.RegularExpressions.Regex]::Match($ErrorMessage, "Connecting to remote server (\S+) failed with the following error message") if ($match.Groups.Count -ne 2) { return $null } return $match.Groups[1].Value } function Debug-WinRMConnection { <# .SYNOPSIS Attempts to determine why the specified computer could not be reached using WinRM. 1. Checks whether a command can be invoked remotely on the computer using the domain admin credential. 2. Checks whether the computer can be pinged. 3. If the computer is a VM, then checks whether the VM exists. 4. If the computer is a VM, then checks whether the VM is running. 5. If the computer is a VM, then checks whether a command can be invoked remotely on the computer using PowerShell Direct from its host. #> [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string] $ComputerName, [Parameter(Mandatory = $true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = "Stop" Import-Module "$PSScriptRoot\..\Roles\Common\RoleHelpers.psm1" -DisableNameChecking -Verbose:$false # Check whether Invoke-Command works remotely. $domainAdminCredential = Get-DomainCredential -Parameters $Parameters Trace-Execution "Testing WinRM on $ComputerName by attempting to invoke a command using the domain admin credential." try { Invoke-Command -ComputerName $ComputerName -Credential $domainAdminCredential -ScriptBlock { ; } Trace-Execution "Successfully invoked command on $ComputerName using the domain admin credential." return } catch { Trace-Warning "Failed to invoke command on $ComputerName using the domain admin credential: $_" } # Check whether the machine can be pinged. Trace-Execution "Testing network connectivity to $ComputerName from $([System.Environment]::MachineName)." if ((Test-NetConnection $ComputerName).PingSucceeded) { Trace-Execution "Successfully pinged $ComputerName from $([System.Environment]::MachineName)." return } Trace-Warning "Failed to ping $ComputerName from $([System.Environment]::MachineName)." # Check Hyper-V state if the machine is a VM. [string[]]$physicalHosts = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name [string[]]$clusters = Get-ClusterNames $Parameters if (($physicalHosts -inotcontains $ComputerName) -and ($clusters -inotcontains $ComputerName)) { Trace-Execution "Testing Hyper-V state of the VM $ComputerName." $vm = $null $targetHost = $null foreach ($physicalHost in $physicalHosts) { try { $vm = Get-VM -ComputerName $physicalHost -Credential $domainAdminCredential | Where-Object { $_.Name -ieq $ComputerName } } catch { Trace-Warning "An exception was thrown by Get-VM when targeting $($physicalHost): $_" } if ($null -ne $vm) { $targetHost = $physicalHost break } } if ($null -eq $vm) { Trace-Warning "The VM $ComputerName was not found." return } if ($vm.State -ne "Running") { Trace-Warning "The VM $ComputerName is in $($vm.State) state." return } Trace-Execution "Testing PowerShell Direct from $targetHost to $ComputerName." try { Invoke-Command $targetHost -Credential $domainAdminCredential -Authentication Credssp -ScriptBlock { Invoke-Command -VMName $using:ComputerName -Credential $using:domainAdminCredential -ScriptBlock { ; } } Trace-Execution "Successfully invoked command from $targetHost to $ComputerName using PowerShell Direct." } catch { Trace-Warning "Failed to invoke command from $targetHost to $ComputerName using PowerShell Direct: $_" } } else { Trace-Warning "$ComputerName is a physical host or cluster. Cannot test the Hyper-V state." } } Export-ModuleMember -Function Debug-WinRMConnection Export-ModuleMember -Function Get-WinRMComputerName # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC1Ted0z8ki9hec # 2vLIJAhoZwObZ8WSW2n68uIuLmOV96CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDFDzkUofVeG6HC14NUb3uSi # yoivDnRtlu4sVzxysJQjMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAM2HVsXH6XIlRSANS0trBd/cTGYLpZ4WR0V4WSPme0Hj7FgLN8LQpXKSG # wGNNHT29e/NL/cuz9rKO7W+0q7jhnYTZIkax4G3UdFQ/76cdMJXEI+lizsvPmFi/ # qxL+JkSO9ZwLYUr+70XXiJxFcmUg7jOF76GPbXXEMVH7NoMTWbvW5i8rx1BdxC/P # KH4oa3zGJzXp1waZrI99v8n6EljK2hvmchYR7qULAl9VX4tIykNseb+gbHTaspbe # i5bxQW/27BI367p2p5R5TAa3kY6rj2YlrM56XlqblP0omDuC/vcsQyHqKGqtA3C3 # VljLquc2rTTyr6vmZX4TpuJmIxB1YaGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCaI9d5mwJr1aV8m3yHtbncCP2EuxmP1u5WgjJXJDmvKgIGZkYiWzzz # GBMyMDI0MDUxNjE4NDUxNy41MThaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHsMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4 # EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob # FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs # 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC # z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I # U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU # qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR # BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO # oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ # sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX # OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh # twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG # Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM # Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe # ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV # xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI # bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM # fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF # C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO # Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x # 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT # 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu # Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNP # MIICNwIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC # KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6fCg2TAiGA8yMDI0MDUxNjE1MTIy # NVoYDzIwMjQwNTE3MTUxMjI1WjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDp8KDZ # AgEAMAkCAQACATcCAf8wBwIBAAICEuYwCgIFAOnx8lkCAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAePV51DW0f865fIazZKp1tXZGs4fFq7oHQO66OZOUjZ+2 # o4/BNqFf6E8vU3FkWVyrZujrYsR6Hy7FS/4iyoAHmmvqRNgfvWpJnGxfXHozA3Sg # H5zj6V6l/+QIwlW1uru2ZmIOpetcmudGdYVD1uur/PL0prDEqRPD8paKJCxKBgWA # 5VSijQQNKQ1V7YCA4pTTKewv4hoLSAgqWO2vVqXlEZV71Yt9Lapg+fuCWNVc+ihM # D5/6vKz7b6b5ir5QO42oTxaU9XUQeXIqzkQzFrIPrla2FAsMQlzfU9exa9cdsE+9 # BOnRQsaGENvNxI0xBqJ3WuyuXnXmQo0pBit52yZ7qzGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB8Cp8HVk75h+tAAEAAAHw # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEIBS5dSvacB4t+Dz0fp5h7OZ6Q8zJGMiiZgfuZTt/P5HU # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgXAGao6Vy/eRTuYAHmxZHvhAU # CJLqZv4IzpqycUBlS4swgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB8DAiBCAKYc5/DT+Isk5fFZhPzToAI+1Z # gbu5VQpXnTMQ+fUWyjANBgkqhkiG9w0BAQsFAASCAgANuHpR9Hdf4/0NLH9rG6UC # +GF65fw2PEJLvvDQKg/0PcK3rL3vhbVPeZC640xnqA1gjcQI7VxVHKPcvZIvSRPB # sOyspM9JmnWy19iAmKe8IRUoAh6+2Dzp41nk2hEU3tf+mRpuINO07VAcTzPhrpOo # R9yulDq0udcekoojohKf+yAd0b8dV9Rtn2zJt59OyunYLKTcbpQPoreJOuqVOilQ # qgzSctcRZWcQrbGB6SQsykuF3u/SH98IXJcP9kAMUrkNSA6mQ3qDJOzcGq8Ae1uk # sqBP+RoWbKJIdfc/JfVyxgIIpvDVRtLfCSx4a+Ow2PDI8a8rj6n4DtPtEePXi/1Q # vjMGu3mROmbg9LzT+MC+2GgJUROat32X/f2OFQ5v+7rSjSNVRsWJbCMJaDGg8+nX # SnFyFAhnQ7pDq19+9NY3bk/QjLnU1L/2LT/l1PR4pGdYie6ZZmWoASh14PZSulg+ # sg9qxadQyzegWooYAOCe/B/EYLVoUeyMHuSzqENDd3p+u4h+ISv7DakHEbwDYp6Z # LJ2HxUbsXOqv/zCVHoIlkX6Q50ZP9FI44xF1thEq3zr+oG3wheBH5WkY8NVfIGVi # QseiN5lJLGt+FNcABfGfPsaGImYOr+W2ISPuWjr3g8o+n9006T7dmYWXh0WbRI+K # npXqzWzV+MfRP+TOhzx04Q== # SIG # End signature block
combined_dataset/train/non-malicious/2139.ps1
2139.ps1
Describe "ParserTests (admin\monad\tests\monad\src\engine\core\ParserTests.cs)" -Tags "CI" { BeforeAll { $functionDefinitionFile = Join-Path -Path $TestDrive -ChildPath "functionDefinition.ps1" $functionDefinition = @' function testcmd-parserbvt { [CmdletBinding()] param ( [Parameter(Position = 0)] [string] $Property1 = "unset", [Parameter(Position = 1)] [string] $Property2 = "unset", [Parameter(Position = 2)] [string] $Property3 = "unset", [Parameter()] [ValidateSet("default","array","object","nestedobject","struct","mshobject","nulltostring")] [string]$ReturnType = "default" ) begin {} process { if ( ! $ReturnType ) { $ReturnType = "default" } switch ( $ReturnType ) { "default" { $result = "$Property1; $Property2; $Property3" break } "array" { $result = 1,2,3 break } "object" { $result = new-object psobject break } "nestedobject" { $result = [pscustomobject]@{Name="John";Person=[pscustomobject]@{Name="John";Age=30}} break } "struct" { $result = [pscustomobject]@{Name="John";Age=30} break } "mshobject" { $result = new-object psobject break } "nulltostring" { $result = $null break } default { throw ([invalidoperationexception]::new("ReturnType parameter wasn't of any Expected value!")) break } } return $result } end {} } '@ $functionDefinition>$functionDefinitionFile $PowerShell = [powershell]::Create() $PowerShell.AddScript(". $functionDefinitionFile").Invoke() $PowerShell.Commands.Clear() function ExecuteCommand { param ([string]$command) try { $PowerShell.AddScript($command).Invoke() } finally { $PowerShell.Commands.Clear() } } } BeforeEach { $testfile = Join-Path -Path $TestDrive -ChildPath "testfile.ps1" $shellfile = Join-Path -Path $TestDrive -ChildPath "testfile.cmd" $testfolder1 = Join-Path -Path $TestDrive -ChildPath "dir1" $testfolder2 = Join-Path -Path $testfolder1 -ChildPath "dir2" if (-not(Test-Path $testfolder1)) { New-Item $testfolder1 -Type Directory } if (-not(Test-Path $testfolder2)) { New-Item $testfolder2 -Type Directory } $testdirfile1 = Join-Path -Path $testfolder2 -ChildPath "testdirfile1.txt" $testdirfile2 = Join-Path -Path $testfolder2 -ChildPath "testdirfile2.txt" Set-Content -Path $testdirfile1 -Value "" Set-Content -Path $testdirfile2 -Value "" } AfterEach { if (Test-Path $testfile) { Remove-Item $testfile } if (Test-Path $shellfile) { Remove-Item $shellfile } if (Test-Path $testdirfile1) { Remove-Item $testdirfile1 } if (Test-Path $testdirfile2) { Remove-Item $testdirfile2 } if (Test-Path $testfolder2) { Remove-Item $testfolder2 } if (Test-Path $testfolder1) { Remove-Item $testfolder1 } } AfterAll { if (Test-Path $functionDefinitionFile) { Remove-Item $functionDefinitionFile } } It "Throws a syntax error when parsing a string without a closing quote. (line 164)" { { ExecuteCommand '"This is a test' } | Should -Throw -ErrorId "IncompleteParseException" } It "Throws an error if an open parenthesis is not closed (line 176)" { { ExecuteCommand "(" } | Should -Throw -ErrorId "IncompleteParseException" } It "Throws an exception if the the first statement starts with an empty pipe element (line 188)" { { ExecuteCommand "| Get-Location" } | Should -Throw -ErrorId "ParseException" } It "Throws an CommandNotFoundException exception if using a label in front of an if statement is not allowed. (line 225)" { $PowerShell.Streams.Error.Clear() ExecuteCommand ":foo if ($x -eq 3) { 1 }" $PowerShell.HadErrors | Should -BeTrue $PowerShell.Streams.Error.FullyQualifiedErrorId | Should -Be "CommandNotFoundException" } It "Pipe an expression into a value expression. (line 237)" { { ExecuteCommand "testcmd-parserbvt | 3" } | Should -Throw -ErrorId "ParseException" { ExecuteCommand "testcmd-parserbvt | $(1 + 1)" } | Should -Throw -ErrorId "ParseException" { ExecuteCommand "testcmd-parserbvt | 'abc'" } | Should -Throw -ErrorId "ParseException" } It "Throws when you pipe into a value expression (line 238)" { param($Command) { ExecuteCommand $command } | Should -Throw -ErrorId "ParseException" } -TestCases @( @{ Command = '1;2;3|3' } @{ Command = '1;2;3|$(1+1)' } @{ Command = "1;2;3|'abc'" } ) It "Throws an incomplete parse exception when a comma follows an expression (line 247)" { { ExecuteCommand "(1+ 1)," } | Should -Throw -ErrorId "IncompleteParseException" } It "Test that invoke has a higher precedence for a script than for an executable. (line 279)" { Set-Content -Path $testfile -Value "1" $result = ExecuteCommand ". $testfile" $result | Should -Be 1 } It "This test will check that a path is correctly interpreted when using '..' and '.' (line 364)" { $result = ExecuteCommand "Set-Location $TestDrive; Get-ChildItem dir1\.\.\.\..\dir1\.\dir2\..\..\dir1\.\dir2" $result.Count | Should -Be 2 $result[0].Name | Should -BeExactly "testdirfile1.txt" $result[1].Name | Should -BeExactly "testdirfile2.txt" } It "This test will check that the parser can handle a mix of forward slashes and back slashes in the path (line 417)" { $result = ExecuteCommand "Get-ChildItem $TestDrive/dir1/./.\.\../dir1/.\dir2\../..\dir1\.\dir2" $result.Count | Should -Be 2 $result[0].Name | Should -BeExactly "testdirfile1.txt" $result[1].Name | Should -BeExactly "testdirfile2.txt" } It "This test checks that the asterisk globs as expected. (line 545)" { $result = ExecuteCommand "Get-ChildItem $TestDrive/dir1\dir2\*.txt" $result.Count | Should -Be 2 $result[0].Name | Should -BeExactly "testdirfile1.txt" $result[1].Name | Should -BeExactly "testdirfile2.txt" } It "This test checks that we can use a range for globbing: [1-2] (line 557)" { $result = ExecuteCommand "Get-ChildItem $TestDrive/dir1\dir2\testdirfile[1-2].txt" $result.Count | Should -Be 2 $result[0].Name | Should -BeExactly "testdirfile1.txt" $result[1].Name | Should -BeExactly "testdirfile2.txt" } It "Test that escaping a space just returns that space. (line 593)" { $result = ExecuteCommand '"foo` bar"' $result | Should -BeExactly "foo bar" } It "Test that escaping the character 'e' returns the ESC character (0x1b)." { $result = ExecuteCommand '"`e"' $result | Should -BeExactly ([char]0x1b) } Context "Test Unicode escape sequences." { It 'Test that the bracketed Unicode escape sequence `u{0} returns minimum char.' { $result = ExecuteCommand '"`u{0}"' [int]$result[0] | Should -Be 0 } It 'Test that the bracketed Unicode escape sequence `u{10FFFF} returns maximum surrogate char pair.' { $result = ExecuteCommand '"`u{10FFFF}"' [int]$result[0] | Should -BeExactly 0xDBFF [int]$result[1] | Should -BeExactly 0xDFFF } It 'Test that the bracketed Unicode escape sequence `u{a9} returns the © character.' { $result = ExecuteCommand '"`u{a9}"' $result | Should -BeExactly '©' } It 'Test that Unicode escape sequence `u{2195} in string returns the ↕ character.' { $result = ExecuteCommand '"foo`u{2195}abc"' $result | Should -BeExactly "foo↕abc" } It 'Test that the bracketed Unicode escape sequence `u{1f44d} returns surrogate pair for emoji 👍 character.' { $result = ExecuteCommand '"`u{1f44d}"' $result | Should -BeExactly "👍" } It 'Test that Unicode escape sequence `u{2195} in here string returns the ↕ character.' { $result = ExecuteCommand ("@`"`n`n" + 'foo`u{2195}abc' + "`n`n`"@") $result | Should -BeExactly "`nfoo↕abc`n" } It 'Test that Unicode escape sequence in single quoted is not processed.' { $result = ExecuteCommand '''foo`u{2195}abc''' $result | Should -BeExactly 'foo`u{2195}abc' } It 'Test that Unicode escape sequence in single quoted here string is not processed.' { $result = ExecuteCommand @" @' foo``u{2195}abc '@ "@ $result | Should -Match "\r?\nfoo``u\{2195\}abc\r?\n" } It "Test that two consecutive Unicode escape sequences are tokenized correctly." { $result = ExecuteCommand '"`u{007b}`u{007d}"' $result | Should -Be '{}' } It "Test that a Unicode escape sequence can be used in a command name." { function xyzzy`u{2195}($p) { $p } $cmd = Get-Command xyzzy`u{2195} -ErrorAction SilentlyContinue $cmd | Should -Not -BeNullOrEmpty $cmd.Name | Should -BeExactly 'xyzzy↕' xyzzy`u{2195} 42 | Should -Be 42 } It "Test that a Unicode escape sequence can be used in a variable name." { ${fooxyzzy`u{2195}} = 42 $var = Get-Variable -Name fooxyzzy* -ErrorAction SilentlyContinue $var | Should -Not -BeNullOrEmpty $var.Name | Should -BeExactly "fooxyzzy↕" $var.Value | Should -Be 42 } It "Test that a Unicode escape sequence can be used in an argument." { Write-Output `u{a9}` Acme` Inc | Should -BeExactly "© Acme Inc" } } It "Test that escaping any character with no special meaning just returns that char. (line 602)" { $result = ExecuteCommand '"fo`obar"' $result | Should -BeExactly "foobar" } Context "Test that we support all of the C It 'C param ( $Sequence, $Expected ) $result = ExecuteCommand $Sequence $result | Should -BeExactly $Expected } -TestCases @( @{ Sequence = "write-output ""`'"""; Expected = [char]39 } @{ Sequence = 'write-output "`""'; Expected = [char]34 } @{ Sequence = '"`\\"'; Expected = '\\' } @{ Sequence = '"`0"'; Expected = [char]0 } @{ Sequence = '"`a"'; Expected = [char]7 } @{ Sequence = '"`b"'; Expected = [char]8 } @{ Sequence = '"`f"'; Expected = [char]12 } @{ Sequence = '"`n"'; Expected = [char]10 } @{ Sequence = '"`r"'; Expected = [char]13 } @{ Sequence = '"`t"'; Expected = [char]9 } @{ Sequence = '"`v"'; Expected = [char]11 } ) } It "This test checks that array substitution occurs inside double quotes. (line 646)" { $result = ExecuteCommand '$MyArray = "a","b"; "Hello $MyArray"' $result | Should -BeExactly "Hello a b" } It "This tests declaring an array in nested variable tables. (line 761)" { $result = ExecuteCommand '$Variable:vtbl1:vtbl2:b=@(5,6); $Variable:vtbl1:vtbl2:b' $result.Count | Should -Be 2 $result[0] | Should -Be 5 $result[1] | Should -Be 6 } It "Test a simple multiple assignment. (line 773)" { $result = ExecuteCommand '$one, $two = 1, 2, 3; "One = $one"; "Two = $two"' $result.Count | Should -Be 2 $result[0] | Should -Be "One = 1" $result[1] | Should -Be "Two = 2 3" } It "Tests script, global and local scopes from a function inside a script. (line 824)" { @' $var = "script" function func { $var $var = "local" $local:var $script:var $global:var } func $var '@ | Set-Content -Path $testfile ExecuteCommand '$var = "global"' $result = ExecuteCommand $testfile $result.Count | Should -Be 5 $result[0] | Should -BeExactly "script" $result[1] | Should -BeExactly "local" $result[2] | Should -BeExactly "script" $result[3] | Should -BeExactly "global" $result[4] | Should -BeExactly "script" } It "Use break inside of a loop that is inside another loop. (line 945)" { param($Command, $ExpectedResult) $result = ExecuteCommand $Command $result | Should -Be $ExpectedResult } -TestCases @( @{ Command = ' while ($true) { 1 while ($true) { 2; break; 3 } 4; break; 5 } ' ExpectedResult = "1", "2", "4" } @{ Command = ' for (;;) { 1 for(;;) { 2; break; 3 } 4; break; 5 } ' ExpectedResult = "1", "2", "4" } @{ Command = ' foreach ($a in 1..3) { 1 foreach ($b in 1..3) { 2; break; 3 } 4; break; 5 } ' ExpectedResult = "1", "2", "4" } ) It "Use break in two loops with same label. (line 967)" { param($Command, $ExpectedResult) $result = ExecuteCommand $Command $result | Should -Be $ExpectedResult } -TestCases @( @{ Command = ' :foo while ($true) { 1 :foo while ($true) { 2; break foo; 3 } 4; break; 5 } ' ExpectedResult = "1", "2", "4" } @{ Command = ' :foo for (;;) { 1 :foo for (;;) { 2; break foo; 3 } 4; break; 5 } ' ExpectedResult = "1", "2", "4" } @{ Command = ' :foo foreach($a in 1..3) { 1 :foo foreach($b in 1..3) { 2; break foo; 3 } 4; break; 5 } ' ExpectedResult = "1", "2", "4" } ) It "Try continue inside of different loop statements. (line 1039)" { param($Command, $ExpectedResult) $result = ExecuteCommand $Command $result | Should -Be $ExpectedResult } -TestCases @( @{ Command = ' $a = 0 while ($a -lt 2) { ($a++) continue 2 } ' ExpectedResult = "0", "1" } @{ Command = ' for ($a = 0; $a -lt 2; $a += 1) { 9; continue; 3 } ' ExpectedResult = "9", "9" } @{ Command = ' foreach ($a in 0, 1) { $a; continue; 2 } ' ExpectedResult = "0", "1" } ) It "Use a label to continue an inner loop. (line 1059)" { param($Command, $ExpectedResult) $result = ExecuteCommand $Command $result | Should -Be $ExpectedResult } -TestCases @( @{ Command = ' $x = 0 while ($x -lt 1) { (++$x); $a = 0 :foo while ($a -lt 2) { $a += 1; $a; continue foo; 3 } 4; continue; 5 } ' ExpectedResult = "1", "1", "2", "4" } @{ Command = ' for ($x = 0; $x -lt 1; $x += 1) { 1 :foo for ($a = 0; $a -lt 2; $a += 1) { $a; continue foo; 3 } 4; continue; 5 } ' ExpectedResult = "1", "0", "1", "4" } @{ Command = ' foreach ($a in 1) { 1 :foo foreach ($b in 1, 2) { $b; continue foo; 3 } 4; continue; 5 } ' ExpectedResult = "1", "1", "2", "4" } ) It "Use continue with a label on a nested loop. (line 1059)" { param($Command, $ExpectedResult) $result = ExecuteCommand $Command $result | Should -Be $ExpectedResult } -TestCases @( @{ Command = ' $x = 0 :foo while ($x -lt 2) { ($x++) :bar while ($true) { 2; continue foo; 3 } 4; continue; 5 } ' ExpectedResult = "0", "2", "1", "2" } @{ Command = ' :foo for ($x = 0; $x -lt 2; $x += 1) { 1 :bar for (;;) { 2; continue foo; 3 } 4; continue; 5 } ' ExpectedResult = "1", "2", "1", "2" } @{ Command = ' :foo foreach ($a in 1..2) { 1 :bar foreach($b in 1..3) { 2; continue foo; 3 } 4; continue; 5 } ' ExpectedResult = "1", "2", "1", "2" } ) It "This test will check that it is a syntax error to use if without a code block. (line 1141)" { { ExecuteCommand 'if ("true")' } | Should -Throw -ErrorId "IncompleteParseException" } It "This test will check that it is a syntax error if the if condition is not complete. (line 1150)" { { ExecuteCommand 'if (' } | Should -Throw -ErrorId "IncompleteParseException" } It "This test will check that it is a syntax error to have an if condition without parentheses. (line 1159)" { { ExecuteCommand 'if "true" { 1} else {2}' } | Should -Throw -ErrorId "ParseException" } It "This test will check that the parser throws a syntax error when the if condition is missing the closing parentheses. (line 1168)" { { ExecuteCommand 'if ("true" { 1};' } | Should -Throw -ErrorId "ParseException" } It "This test will check that it is a syntax error to have an else keyword without the corresponding code block. (line 1177)" { { ExecuteCommand 'if ("true") {1} else' } | Should -Throw -ErrorId "IncompleteParseException" } It "This test will check that the parser throws a syntax error when a foreach loop is not complete. (line 1238)" { { ExecuteCommand '$count=0; $files = $(Get-ChildItem / -Filter *.txt ); foreach ($i ; $count' } | Should -Throw -ErrorId "ParseException" } It "This test will check that the parser throws a syntax error if the foreach loop is not complete. (line 1248)" { { ExecuteCommand '$count=0; $files = $(Get-ChildItem / -Filter *.txt ); foreach ($i in ;$count' } | Should -Throw -ErrorId "ParseException" } It "This will test that the parser throws a syntax error if the foreach loop is missing a closing parentheses. (line 1258)" { { ExecuteCommand '$count=0; $files = $(Get-ChildItem / -Filter *.txt ); foreach ($i in $files ;$count' } | Should -Throw -ErrorId "ParseException" } It "Test that if an exception is thrown from the try block it will be caught in the appropropriate catch block and that the finally block will run regardless of whether an exception is thrown. (line 1317)" { $result = ExecuteCommand ' try { try { throw [ArgumentException]::new() } catch [System.DivideByZeroException] { } finally { "Finally" } } catch { $_.Exception.GetType().FullName } ' $result | Should -Be "Finally", "System.ArgumentException" } It "Test that a break statement in a finally block results in a ParseException" { { ExecuteCommand 'try {} finally { break }' } | Should -Throw -ErrorId ParseException } It "Test that a switch statement with a break in a finally doesn't trigger a parse error" { ExecuteCommand 'try {"success"} finally {switch (1) {foo {break}}}' | Should -BeExactly 'success' } It "Test that null can be passed to a method that expects a reference type. (line 1439)" { $result = ExecuteCommand '$test = "String"; $test.CompareTo($())' $result | Should -Be 1 } It "Tests that command expansion operators can be used as a parameter to an object method. (line 1507)" { $result = ExecuteCommand '$test = "String"; $test.SubString($("hello" | foreach-object { $_.length - 2 } ))' $result | Should -Be "ing" } It "Test that & can be used as a parameter as long as it is quoted. (line 1606)" { $result = ExecuteCommand 'testcmd-parserbvt `&Get-ChildItem' $result | Should -Be "&Get-ChildItem; unset; unset" $result = ExecuteCommand 'testcmd-parserbvt `&*' $result | Should -Be "&*; unset; unset" } It "Run a command with parameters. (line 1621)" { $result = ExecuteCommand 'testcmd-parserBVT -Property1 set' $result | Should -Be "set; unset; unset" } It "Test that typing a number at the command line will return that number. (line 1630)" { $result = ExecuteCommand '3' $result | Should -Be "3" $result | Should -BeOfType [int] } It "This test will check that an msh script can be run without invoking. (line 1641)" { "1">$testfile $result = ExecuteCommand ". $testfile" $result | Should -Be 1 } It "Test that an alias is resolved before a function. (line 1657)" { $result = ExecuteCommand 'set-alias parserInvokeTest testcmd-parserBVT;function parserInvokeTest { 3 };parserInvokeTest' $result | Should -Be "unset; unset; unset" } It "Test that functions are resolved before cmdlets. (line 1678)" { $result_cmdlet = $PowerShell.AddScript('function test-parserfunc { [CmdletBinding()] Param() PROCESS { "cmdlet" } };test-parserfunc').Invoke() $result_func = ExecuteCommand 'function test-parserfunc { "func" };test-parserfunc' $PowerShell.Commands.Clear() $result_cmdlet | Should -Be "cmdlet" $result_func | Should -Be "func" } It "Check that a command that uses shell execute can be run from the command line and that no exception is thrown. (line 1702)" { if ( $IsLinux -or $IsMacOS ) { " /bin/chmod +x $shellfile } else { "@echo Hello, I'm a Cmd script!">$shellfile } { ExecuteCommand "$shellfile" } | Should -Not -Throw } Context "Boolean Tests (starting at line 1723 to line 1772)" { $testData = @( @{ Script = '"False"'; Expected = $true } @{ Script = 'if ("A") { $true } else { $false }'; Expected = $true } @{ Script = 'if (" ") { $true } else { $false }'; Expected = $true } @{ Script = 'if ("String with spaces") { $true } else { $false }'; Expected = $true } @{ Script = 'if ("DoubleQuoted") { $true } else { $false }'; Expected = $true } @{ Script = 'if ("StringWithNullVar$aEmbedded") { $true } else { $false }'; Expected = $true } @{ Script = 'if (0) { $true } else { $false }'; Expected = $false } @{ Script = '$a = $(0);if ($a) { $true } else { $false }'; Expected = $false } @{ Script = '$obj = testcmd-parserBVT -ReturnType object;if ($obj) { $true } else { $false }'; Expected = $true } ) It "<Script> should return <Expected>" -TestCases $testData { param ( $Script, $Expected ) ExecuteCommand $Script | Should -Be $Expected } } Context "Comparison operator Tests (starting at line 1785 to line 1842)" { $testData = @( @{ Script = 'if (1 -and 1) { $true } else { $false }'; Expected = $true } @{ Script = 'if (1 -and 0) { $true } else { $false }'; Expected = $false } @{ Script = 'if (0 -and 1) { $true } else { $false }'; Expected = $false } @{ Script = 'if (0 -and 0) { $true } else { $false }'; Expected = $false } @{ Script = 'if (1 -or 1) { $true } else { $false }'; Expected = $true } @{ Script = 'if (1 -or 0) { $true } else { $false }'; Expected = $true } @{ Script = 'if (0 -or 1) { $true } else { $false }'; Expected = $true } @{ Script = 'if (0 -or 0) { $true } else { $false }'; Expected = $false } @{ Script = 'if ($False -eq $True -and $False) { $true } else { $false }'; Expected = $false } @{ Script = 'if ($False -and $True -eq $False) { $true } else { $false }'; Expected = $false } @{ Script = 'if ($False -ieq $True -and $False) { $true } else { $false }'; Expected = $false } @{ Script = 'if ($False -and $True -ieq $False) { $true } else { $false }'; Expected = $false } @{ Script = 'if ($False -le $True -and $False) { $true } else { $false }'; Expected = $false } @{ Script = 'if ($False -and $True -le $False) { $true } else { $false }'; Expected = $false } @{ Script = 'if ($False -ile $True -and $False) { $true } else { $false }'; Expected = $false } @{ Script = 'if ($False -and $True -ile $False) { $true } else { $false }'; Expected = $false } @{ Script = 'if ($False -ge $True -and $False) { $true } else { $false }'; Expected = $false } @{ Script = 'if ($False -and $True -ge $False) { $true } else { $false }'; Expected = $false } @{ Script = 'if ($False -ige $True -and $False) { $true } else { $false }'; Expected = $false } @{ Script = 'if ($False -and $True -ige $False) { $true } else { $false }'; Expected = $false } @{ Script = 'if ($False -like $True -and $False) { $true } else { $false }'; Expected = $false } @{ Script = 'if ($False -and $True -like $False) { $true } else { $false }'; Expected = $false } @{ Script = 'if (!$True -and $False) { $true } else { $false }'; Expected = $false } ) It "<Script> should return <Expected>" -TestCases $testData { param ( $Script, $Expected ) ExecuteCommand $Script | Should -Be $Expected } } Context "Arithmetic and String Comparison Tests (starting at line 1848 to line 1943)" { $testData = @( @{ Script = '$a=10; if( !$a -eq 10) { $a=1 } else {$a=2};$a'; Expected = 2 } @{ Script = "!3"; Expected = $false } @{ Script = '$a=10; if($a -lt 15) { $a=1 } else {$a=2};$a'; Expected = 1 } @{ Script = "'aaa' -ilt 'AAA'"; Expected = $false } @{ Script = "'aaa' -lt 'AAA'"; Expected = $false } @{ Script = "'aaa' -clt 'AAA'"; Expected = $true } @{ Script = '$a=10; if($a -gt 15) { $a=1 } else {$a=2};$a'; Expected = 2 } @{ Script = "'AAA' -igt 'aaa'"; Expected = $false } @{ Script = "'AAA' -gt 'aaa'"; Expected = $false } @{ Script = "'AAA' -cgt 'aaa'"; Expected = $true } @{ Script = '$a=10; if($a -ge 10) { $a=1 } else {$a=2};$a'; Expected = 1 } @{ Script = "'aaa' -ge 'aaa'"; Expected = $true } @{ Script = '$a=10; if($a -ne 10) { $a=1 } else {$a=2};$a'; Expected = 2 } @{ Script = "'aaa' -ine 'AAA'"; Expected = $false } @{ Script = "'aaa' -ne 'AAA'"; Expected = $false } @{ Script = "'aaa' -cne 'AAA'"; Expected = $true } @{ Script = '$a="abc"; if($a -ieq "ABC") { $a=1 } else {$a=2};$a'; Expected = 1 } @{ Script = "'aaa' -ieq 'AAA'"; Expected = $true } @{ Script = '$a="abc"; if($a -igt "bbc") { $a=1 } else {$a=2};$a'; Expected = 2 } @{ Script = "'aaa' -igt 'AAA'"; Expected = $false } @{ Script = '$a="abc"; if($a -ile "bbc") { $a=1 } else {$a=2};$a'; Expected = 1 } @{ Script = "'aaa' -ile 'AAA'"; Expected = $true } ) It "<Script> should return <Expected>" -TestCases $testData { param ( $Script, $Expected ) ExecuteCommand $Script | Should -Be $Expected } } Context "Comparison Operators with Arrays Tests (starting at line 2015 to line 2178)" { $testData = @( @{ Script = "@(3) -eq 3"; Expected = "3" } @{ Script = "@(4) -eq 3"; Expected = $null } @{ Script = "@() -eq 3"; Expected = $null } @{ Script = '$test = 1,2,@(3,4);$test -eq 3'; Expected = $null } @{ Script = '$test = 1,2,@(3,4);$test -eq 2'; Expected = "2" } @{ Script = '$test = 1,2,@(3,4);$test -eq 0'; Expected = $null } ) It "<Script> should return <Expected>" -TestCases $testData { param ( $Script, $Expected ) ExecuteCommand $Script | Should -Be $Expected } } It "A simple test for trapping a specific exception. Expected Result: The exception is caught and ignored. (line 2265)" { { ExecuteCommand "trap [InvalidCastException] { continue; }; [int] 'abc'" } | Should -Not -Throw } It "Test that assign to input var and use then execute a script block with piped input. (line 2297)" { $result = ExecuteCommand '$input = 1,2,3;4,-5,6 | & { $input }' $result -join "" | Should -Be (4, -5, 6 -join "") } It "Test that pipe objects into a script and use arguments. (line 2313)" { "`$input; `$args;">$testfile $result = ExecuteCommand "1,2,3 | $testfile" $result -join "" | Should -Be (1, 2, 3 -join "") $result = ExecuteCommand "$testfile 4 -5 6 -blah -- foo -bar" $result | Should -BeExactly "4", "-5", "6", "-blah", "foo", "-bar" } Context "Numerical Notations Tests (starting at line 2374 to line 2452)" { $testData = @( @{ Script = "0"; ExpectedValue = "0"; ExpectedType = [int] } @{ Script = "10"; ExpectedValue = "10"; ExpectedType = [int] } @{ Script = "-10"; ExpectedValue = "-10"; ExpectedType = [int] } @{ Script = "+10"; ExpectedValue = "10"; ExpectedType = [int] } @{ Script = $([int32]::MaxValue); ExpectedValue = $([int32]::MaxValue); ExpectedType = [int] } @{ Script = $([int32]::MinValue); ExpectedValue = $([int32]::MinValue); ExpectedType = [int] } @{ Script = "0.0"; ExpectedValue = "0"; ExpectedType = [double] } @{ Script = "6.5"; ExpectedValue = "6.5"; ExpectedType = [double] } @{ Script = "-6.5"; ExpectedValue = "-6.5"; ExpectedType = [double] } @{ Script = "9.12"; ExpectedValue = "9.12"; ExpectedType = [double] } @{ Script = ".01"; ExpectedValue = "0.01"; ExpectedType = [double] } @{ Script = $([single]::MinValue); ExpectedValue = $([float]::MinValue).ToString("G7"); ExpectedType = [double] } @{ Script = $([float]::MaxValue); ExpectedValue = $([float]::MaxValue).ToString("G7"); ExpectedType = [double] } @{ Script = "0e0"; ExpectedValue = "0"; ExpectedType = [double] } @{ Script = "0e1"; ExpectedValue = "0"; ExpectedType = [double] } @{ Script = "-0e2"; ExpectedValue = "-0"; ExpectedType = [double] } @{ Script = "3e0"; ExpectedValue = "3"; ExpectedType = [double] } @{ Script = "5e-2"; ExpectedValue = "0.05"; ExpectedType = [double] } @{ Script = "5e2"; ExpectedValue = "500"; ExpectedType = [double] } @{ Script = "-5e-2"; ExpectedValue = "-0.05"; ExpectedType = [double] } @{ Script = "-5e2"; ExpectedValue = "-500"; ExpectedType = [double] } @{ Script = "0x0"; ExpectedValue = "0"; ExpectedType = [int] } @{ Script = "0x12"; ExpectedValue = "18"; ExpectedType = [int] } @{ Script = "-0x12"; ExpectedValue = "-18"; ExpectedType = [int] } @{ Script = "0x80000000"; ExpectedValue = $([int32]::MinValue); ExpectedType = [int] } @{ Script = "0x7fffffff"; ExpectedValue = $([int32]::MaxValue); ExpectedType = [int] } @{ Script = "0x100000000"; ExpectedValue = [int64]0x100000000; ExpectedType = [long] } @{ Script = "0xFF"; ExpectedValue = "255"; ExpectedType = [int] } @{ Script = "0xFFFF"; ExpectedValue = "65535"; ExpectedType = [int] } @{ Script = "0xFFFFFF"; ExpectedValue = "16777215"; ExpectedType = [int] } @{ Script = "0xFFFFFFFF"; ExpectedValue = "-1"; ExpectedType = [int] } @{ Script = "0xFFFFFFFFFF"; ExpectedValue = "1099511627775"; ExpectedType = [long] } @{ Script = "0xFFFFFFFFFFFF"; ExpectedValue = "281474976710655"; ExpectedType = [long] } @{ Script = "0xFFFFFFFFFFFFFF"; ExpectedValue = "72057594037927935"; ExpectedType = [long] } @{ Script = "0xFFFFFFFFFFFFFFFF"; ExpectedValue = "-1"; ExpectedType = [long] } @{ Script = "0b0"; ExpectedValue = "0"; ExpectedType = [int] } @{ Script = "0b10"; ExpectedValue = "2"; ExpectedType = [int] } @{ Script = "-0b10"; ExpectedValue = "-2"; ExpectedType = [int] } @{ Script = "0b11111111"; ExpectedValue = "-1"; ExpectedType = [int] } @{ Script = "0b1111111111111111"; ExpectedValue = "-1"; ExpectedType = [int] } @{ Script = "0b11111111111111111111111111111111"; ExpectedValue = "-1"; ExpectedType = [int] } @{ Script = "0b1111111111111111111111111111111111111111111111111111111111111111"; ExpectedValue = "-1"; ExpectedType = [long] } @{ Script = "1kb"; ExpectedValue = "1024"; ExpectedType = [int] } @{ Script = "1mb"; ExpectedValue = "1048576"; ExpectedType = [int] } @{ Script = "1gb"; ExpectedValue = "1073741824"; ExpectedType = [int] } @{ Script = "1tb"; ExpectedValue = "1099511627776"; ExpectedType = [long] } @{ Script = "1pb"; ExpectedValue = "1125899906842624"; ExpectedType = [long] } @{ Script = "0d"; ExpectedValue = "0"; ExpectedType = [decimal] } @{ Script = "100d"; ExpectedValue = "100"; ExpectedType = [decimal] } @{ Script = "-100d"; ExpectedValue = "-100"; ExpectedType = [decimal] } @{ Script = "+100d"; ExpectedValue = "100"; ExpectedType = [decimal] } @{ Script = "0.0d"; ExpectedValue = "0.0"; ExpectedType = [decimal] } @{ Script = "1.5d"; ExpectedValue = "1.5"; ExpectedType = [decimal] } @{ Script = "-1.5d"; ExpectedValue = "-1.5"; ExpectedType = [decimal] } @{ Script = "0e0d"; ExpectedValue = "0"; ExpectedType = [decimal] } @{ Script = "15e3d"; ExpectedValue = "15000"; ExpectedType = [decimal] } @{ Script = "-15e3d"; ExpectedValue = "-15000"; ExpectedType = [decimal] } @{ Script = "1dkb"; ExpectedValue = "1024"; ExpectedType = [decimal] } @{ Script = "1dmb"; ExpectedValue = "1048576"; ExpectedType = [decimal] } @{ Script = "1dgb"; ExpectedValue = "1073741824"; ExpectedType = [decimal] } @{ Script = "1dtb"; ExpectedValue = "1099511627776"; ExpectedType = [decimal] } @{ Script = "1dpb"; ExpectedValue = "1125899906842624"; ExpectedType = [decimal] } @{ Script = "0y"; ExpectedValue = "0"; ExpectedType = [sbyte] } @{ Script = "10y"; ExpectedValue = "10"; ExpectedType = [sbyte] } @{ Script = "-10y"; ExpectedValue = "-10"; ExpectedType = [sbyte] } @{ Script = "+10y"; ExpectedValue = "10"; ExpectedType = [sbyte] } @{ Script = "0.0y"; ExpectedValue = "0"; ExpectedType = [sbyte] } @{ Script = "3.72y"; ExpectedValue = "4"; ExpectedType = [sbyte] } @{ Script = "-3.72y"; ExpectedValue = "-4"; ExpectedType = [sbyte] } @{ Script = "0e0y"; ExpectedValue = "0"; ExpectedType = [sbyte] } @{ Script = "3e0y"; ExpectedValue = "3"; ExpectedType = [sbyte] } @{ Script = "-3e0y"; ExpectedValue = "-3"; ExpectedType = [sbyte] } @{ Script = "3e1y"; ExpectedValue = "30"; ExpectedType = [sbyte] } @{ Script = "-3e1y"; ExpectedValue = "-30"; ExpectedType = [sbyte] } @{ Script = "0x0y"; ExpectedValue = "0"; ExpectedType = [sbyte] } @{ Script = "0x41y"; ExpectedValue = "65"; ExpectedType = [sbyte] } @{ Script = "-0x41y"; ExpectedValue = "-65"; ExpectedType = [sbyte] } @{ Script = "0b0y"; ExpectedValue = "0"; ExpectedType = [sbyte] } @{ Script = "0b10y"; ExpectedValue = "2"; ExpectedType = [sbyte] } @{ Script = "-0b10y"; ExpectedValue = "-2"; ExpectedType = [sbyte] } @{ Script = "0b11111111y"; ExpectedValue = "-1"; ExpectedType = [sbyte] } @{ Script = "0s"; ExpectedValue = "0"; ExpectedType = [short] } @{ Script = "10s"; ExpectedValue = "10"; ExpectedType = [short] } @{ Script = "-10s"; ExpectedValue = "-10"; ExpectedType = [short] } @{ Script = "+10s"; ExpectedValue = "10"; ExpectedType = [short] } @{ Script = "0.0s"; ExpectedValue = "0"; ExpectedType = [short] } @{ Script = "3.72s"; ExpectedValue = "4"; ExpectedType = [short] } @{ Script = "-3.72s"; ExpectedValue = "-4"; ExpectedType = [short] } @{ Script = "0e0s"; ExpectedValue = "0"; ExpectedType = [short] } @{ Script = "3e0s"; ExpectedValue = "3"; ExpectedType = [short] } @{ Script = "-3e0s"; ExpectedValue = "-3"; ExpectedType = [short] } @{ Script = "3e2s"; ExpectedValue = "300"; ExpectedType = [short] } @{ Script = "-3e2s"; ExpectedValue = "-300"; ExpectedType = [short] } @{ Script = "0x0s"; ExpectedValue = "0"; ExpectedType = [short] } @{ Script = "0x41s"; ExpectedValue = "65"; ExpectedType = [short] } @{ Script = "-0x41s"; ExpectedValue = "-65"; ExpectedType = [short] } @{ Script = "0b0s"; ExpectedValue = "0"; ExpectedType = [short] } @{ Script = "0b10s"; ExpectedValue = "2"; ExpectedType = [short] } @{ Script = "-0b10s"; ExpectedValue = "-2"; ExpectedType = [short] } @{ Script = "0b11111111s"; ExpectedValue = "-1"; ExpectedType = [short] } @{ Script = "1skb"; ExpectedValue = "1024"; ExpectedType = [short] } @{ Script = "0l"; ExpectedValue = "0"; ExpectedType = [long] } @{ Script = "10l"; ExpectedValue = "10"; ExpectedType = [long] } @{ Script = "-10l"; ExpectedValue = "-10"; ExpectedType = [long] } @{ Script = "+10l"; ExpectedValue = "10"; ExpectedType = [long] } @{ Script = "0.0l"; ExpectedValue = "0"; ExpectedType = [long] } @{ Script = "2.5l"; ExpectedValue = "2"; ExpectedType = [long] } @{ Script = "-2.5l"; ExpectedValue = "-2"; ExpectedType = [long] } @{ Script = "0e0l"; ExpectedValue = "0"; ExpectedType = [long] } @{ Script = "3e0l"; ExpectedValue = "3"; ExpectedType = [long] } @{ Script = "-3e0l"; ExpectedValue = "-3"; ExpectedType = [long] } @{ Script = "3e2l"; ExpectedValue = "300"; ExpectedType = [long] } @{ Script = "-3e2l"; ExpectedValue = "-300"; ExpectedType = [long] } @{ Script = "0x0l"; ExpectedValue = "0"; ExpectedType = [long] } @{ Script = "0x41l"; ExpectedValue = "65"; ExpectedType = [long] } @{ Script = "-0x41l"; ExpectedValue = "-65"; ExpectedType = [long] } @{ Script = "0b0l"; ExpectedValue = "0"; ExpectedType = [long] } @{ Script = "0b10l"; ExpectedValue = "2"; ExpectedType = [long] } @{ Script = "-0b10l"; ExpectedValue = "-2"; ExpectedType = [long] } @{ Script = "0b11111111l"; ExpectedValue = "-1"; ExpectedType = [long] } @{ Script = "1lkb"; ExpectedValue = "1024"; ExpectedType = [long] } @{ Script = "1lmb"; ExpectedValue = "1048576"; ExpectedType = [long] } @{ Script = "1lgb"; ExpectedValue = "1073741824"; ExpectedType = [long] } @{ Script = "1ltb"; ExpectedValue = "1099511627776"; ExpectedType = [long] } @{ Script = "1lpb"; ExpectedValue = "1125899906842624"; ExpectedType = [long] } @{ Script = "0n"; ExpectedValue = "0"; ExpectedType = [bigint] } @{ Script = "10n"; ExpectedValue = "10"; ExpectedType = [bigint] } @{ Script = "-10n"; ExpectedValue = "-10"; ExpectedType = [bigint] } @{ Script = "+10n"; ExpectedValue = "10"; ExpectedType = [bigint] } @{ Script = "0.0n"; ExpectedValue = "0"; ExpectedType = [bigint] } @{ Script = "2.5n"; ExpectedValue = "2"; ExpectedType = [bigint] } @{ Script = "-2.5n"; ExpectedValue = "-2"; ExpectedType = [bigint] } @{ Script = "0e0n"; ExpectedValue = "0"; ExpectedType = [bigint] } @{ Script = "3e2n"; ExpectedValue = "300"; ExpectedType = [bigint] } @{ Script = "-3e2n"; ExpectedValue = "-300"; ExpectedType = [bigint] } @{ Script = "0x0n"; ExpectedValue = "0"; ExpectedType = [bigint] } @{ Script = "0x41n"; ExpectedValue = "65"; ExpectedType = [bigint] } @{ Script = "-0x41n"; ExpectedValue = "-65"; ExpectedType = [bigint] } @{ Script = "0b0n"; ExpectedValue = "0"; ExpectedType = [bigint] } @{ Script = "0b10n"; ExpectedValue = "2"; ExpectedType = [bigint] } @{ Script = "-0b10n"; ExpectedValue = "-2"; ExpectedType = [bigint] } @{ Script = "0b11111111n"; ExpectedValue = "-1"; ExpectedType = [bigint] } @{ Script = "1Nkb"; ExpectedValue = "1024"; ExpectedType = [bigint] } @{ Script = "1Nmb"; ExpectedValue = "1048576"; ExpectedType = [bigint] } @{ Script = "1Ngb"; ExpectedValue = "1073741824"; ExpectedType = [bigint] } @{ Script = "1Ntb"; ExpectedValue = "1099511627776"; ExpectedType = [bigint] } @{ Script = "1Npb"; ExpectedValue = "1125899906842624"; ExpectedType = [bigint] } @{ Script = "0u"; ExpectedValue = "0"; ExpectedType = [uint] } @{ Script = "10u"; ExpectedValue = "10"; ExpectedType = [uint] } @{ Script = "+10u"; ExpectedValue = "10"; ExpectedType = [uint] } @{ Script = "0.0u"; ExpectedValue = "0"; ExpectedType = [uint] } @{ Script = "2.5u"; ExpectedValue = "2"; ExpectedType = [uint] } @{ Script = "0e0u"; ExpectedValue = "0"; ExpectedType = [uint] } @{ Script = "3e2u"; ExpectedValue = "300"; ExpectedType = [uint] } @{ Script = "0x0u"; ExpectedValue = "0"; ExpectedType = [uint] } @{ Script = "0x41u"; ExpectedValue = "65"; ExpectedType = [uint] } @{ Script = "0xFFu"; ExpectedValue = "255"; ExpectedType = [uint] } @{ Script = "0xFFFFu"; ExpectedValue = "65535"; ExpectedType = [uint] } @{ Script = "0xFFFFFFu"; ExpectedValue = "16777215"; ExpectedType = [uint] } @{ Script = "0xFFFFFFFFu"; ExpectedValue = "$([uint]::MaxValue)"; ExpectedType = [uint] } @{ Script = "0xFFFFFFFFFFu"; ExpectedValue = "1099511627775"; ExpectedType = [ulong] } @{ Script = "0xFFFFFFFFFFFFu"; ExpectedValue = "281474976710655"; ExpectedType = [ulong] } @{ Script = "0xFFFFFFFFFFFFFFu"; ExpectedValue = "72057594037927935"; ExpectedType = [ulong] } @{ Script = "0xFFFFFFFFFFFFFFFFu"; ExpectedValue = "$([ulong]::MaxValue)"; ExpectedType = [ulong] } @{ Script = "0b0u"; ExpectedValue = "0"; ExpectedType = [uint] } @{ Script = "0b10u"; ExpectedValue = "2"; ExpectedType = [uint] } @{ Script = "0b11111111u"; ExpectedValue = "255"; ExpectedType = [uint] } @{ Script = "0b1111111111111111u"; ExpectedValue = "65535"; ExpectedType = [uint] } @{ Script = "0b11111111111111111111111111111111u"; ExpectedValue = "4294967295"; ExpectedType = [uint] } @{ Script = "0b1111111111111111111111111111111111111111111111111111111111111111u"; ExpectedValue = "18446744073709551615"; ExpectedType = [ulong] } @{ Script = "1ukb"; ExpectedValue = "1024"; ExpectedType = [uint] } @{ Script = "1umb"; ExpectedValue = "1048576"; ExpectedType = [uint] } @{ Script = "1ugb"; ExpectedValue = "1073741824"; ExpectedType = [uint] } @{ Script = "1utb"; ExpectedValue = "1099511627776"; ExpectedType = [ulong] } @{ Script = "1upb"; ExpectedValue = "1125899906842624"; ExpectedType = [ulong] } @{ Script = "0uy"; ExpectedValue = "0"; ExpectedType = [byte] } @{ Script = "10uy"; ExpectedValue = "10"; ExpectedType = [byte] } @{ Script = "+10uy"; ExpectedValue = "10"; ExpectedType = [byte] } @{ Script = "0.0uy"; ExpectedValue = "0"; ExpectedType = [byte] } @{ Script = "3.72uy"; ExpectedValue = "4"; ExpectedType = [byte] } @{ Script = "0e0uy"; ExpectedValue = "0"; ExpectedType = [byte] } @{ Script = "3e0uy"; ExpectedValue = "3"; ExpectedType = [byte] } @{ Script = "3e1uy"; ExpectedValue = "30"; ExpectedType = [byte] } @{ Script = "0x0uy"; ExpectedValue = "0"; ExpectedType = [byte] } @{ Script = "0x41uy"; ExpectedValue = "65"; ExpectedType = [byte] } @{ Script = "0b0uy"; ExpectedValue = "0"; ExpectedType = [byte] } @{ Script = "0b10uy"; ExpectedValue = "2"; ExpectedType = [byte] } @{ Script = "0b11111111uy"; ExpectedValue = "255"; ExpectedType = [byte] } @{ Script = "0us"; ExpectedValue = "0"; ExpectedType = [ushort] } @{ Script = "10us"; ExpectedValue = "10"; ExpectedType = [ushort] } @{ Script = "+10us"; ExpectedValue = "10"; ExpectedType = [ushort] } @{ Script = "0.0us"; ExpectedValue = "0"; ExpectedType = [ushort] } @{ Script = "3.72us"; ExpectedValue = "4"; ExpectedType = [ushort] } @{ Script = "0e0us"; ExpectedValue = "0"; ExpectedType = [ushort] } @{ Script = "3e0us"; ExpectedValue = "3"; ExpectedType = [ushort] } @{ Script = "3e2us"; ExpectedValue = "300"; ExpectedType = [ushort] } @{ Script = "0x0us"; ExpectedValue = "0"; ExpectedType = [ushort] } @{ Script = "0x41us"; ExpectedValue = "65"; ExpectedType = [ushort] } @{ Script = "0b0us"; ExpectedValue = "0"; ExpectedType = [ushort] } @{ Script = "0b10us"; ExpectedValue = "2"; ExpectedType = [ushort] } @{ Script = "0b11111111us"; ExpectedValue = "255"; ExpectedType = [ushort] } @{ Script = "1uskb"; ExpectedValue = "1024"; ExpectedType = [ushort] } @{ Script = "0ul"; ExpectedValue = "0"; ExpectedType = [ulong] } @{ Script = "10ul"; ExpectedValue = "10"; ExpectedType = [ulong] } @{ Script = "+10ul"; ExpectedValue = "10"; ExpectedType = [ulong] } @{ Script = "0.0ul"; ExpectedValue = "0"; ExpectedType = [ulong] } @{ Script = "2.5ul"; ExpectedValue = "2"; ExpectedType = [ulong] } @{ Script = "0e0ul"; ExpectedValue = "0"; ExpectedType = [ulong] } @{ Script = "3e2ul"; ExpectedValue = "300"; ExpectedType = [ulong] } @{ Script = "0x0ul"; ExpectedValue = "0"; ExpectedType = [ulong] } @{ Script = "0x41ul"; ExpectedValue = "65"; ExpectedType = [ulong] } @{ Script = "0b0ul"; ExpectedValue = "0"; ExpectedType = [ulong] } @{ Script = "0b10ul"; ExpectedValue = "2"; ExpectedType = [ulong] } @{ Script = "0b11111111ul"; ExpectedValue = "255"; ExpectedType = [ulong] } @{ Script = "1ulkb"; ExpectedValue = "1024"; ExpectedType = [ulong] } @{ Script = "1ulmb"; ExpectedValue = "1048576"; ExpectedType = [ulong] } @{ Script = "1ulgb"; ExpectedValue = "1073741824"; ExpectedType = [ulong] } @{ Script = "1ultb"; ExpectedValue = "1099511627776"; ExpectedType = [ulong] } @{ Script = "1ulpb"; ExpectedValue = "1125899906842624"; ExpectedType = [ulong] } ) It "<Script> should return <ExpectedValue>, with type <ExpectedType>" -TestCases $testData { param ( $Script, $ExpectedValue, $ExpectedType ) ExecuteCommand $Script | Should -Be $ExpectedValue ExecuteCommand $Script | Should -BeOfType $ExpectedType } $testInvalidNumerals = @( @{ Script = "16p"; ErrorID = "CommandNotFoundException" } @{ Script = "1_6"; ErrorID = "CommandNotFoundException" } @{ Script = "80x"; ErrorID = "CommandNotFoundException" } @{ Script = "20ux"; ErrorID = "CommandNotFoundException" } @{ Script = "18uu"; ErrorID = "CommandNotFoundException" } @{ Script = "21ss"; ErrorID = "CommandNotFoundException" } @{ Script = "100ll"; ErrorID = "CommandNotFoundException" } @{ Script = "100Il"; ErrorID = "CommandNotFoundException" } @{ Script = "100Is"; ErrorID = "CommandNotFoundException" } @{ Script = "100un"; ErrorID = "CommandNotFoundException" } @{ Script = "100ln"; ErrorID = "CommandNotFoundException" } @{ Script = "100sn"; ErrorID = "CommandNotFoundException" } @{ Script = "100In"; ErrorID = "CommandNotFoundException" } @{ Script = "100yu"; ErrorID = "CommandNotFoundException" } @{ Script = "150su"; ErrorID = "CommandNotFoundException" } @{ Script = "160ud"; ErrorID = "CommandNotFoundException" } @{ Script = "160ld"; ErrorID = "CommandNotFoundException" } @{ Script = "160yd"; ErrorID = "CommandNotFoundException" } @{ Script = "160sd"; ErrorID = "CommandNotFoundException" } @{ Script = "160dd"; ErrorID = "CommandNotFoundException" } @{ Script = "10ds"; ErrorID = "CommandNotFoundException" } @{ Script = "10ud"; ErrorID = "CommandNotFoundException" } @{ Script = "16sl"; ErrorID = "CommandNotFoundException" } @{ Script = "188lu"; ErrorID = "CommandNotFoundException" } @{ Script = "0xFFFFy"; ErrorID = "ParseException" } @{ Script = "500sgb"; ErrorID = "ParseException" } @{ Script = "10000usgb"; ErrorID = "ParseException" } @{ Script = "10000.0usgb"; ErrorID = "ParseException" } @{ Script = "1uykb"; ErrorID = "ParseException" } @{ Script = "10_000ul"; ErrorID = "CommandNotFoundException" } ) It "<Script> should throw an error" -TestCases $testInvalidNumerals { param($Script, $ErrorID) { [ScriptBlock]::Create($Script).Invoke() } | Should -Throw -ErrorId $ErrorID } } It "This is a simple test of the concatenation of two arrays. (line 2460)" { $result = ExecuteCommand '1,2,3 + 4,5,6' $result -join "" | Should -Be (1, 2, 3, 4, 5, 6 -join "") } It "Test that an incomplete parse exception is thrown if the array is unfinished. (line 2473)" { { ExecuteCommand '1,2,' } | Should -Throw -ErrorId "IncompleteParseException" } It "Test that the unary comma is not valid in cmdlet parameters. (line 2482)" { { ExecuteCommand 'write-output 2,,1' } | Should -Throw -ErrorId "ParseException" } It 'Test that "$var:" will expand to nothing inside a string. (line 2551)' { { ExecuteCommand '"$var:"' } | Should -Throw -ErrorId "ParseException" } It "Tests the assignment to a read-only property (line 2593)" { $result = ExecuteCommand '$A=$(testcmd-parserBVT -returntype array); $A.rank =5;$A.rank' $result | Should -Be "1" } It 'Tests accessing using null as index. (line 2648)' { $PowerShell.Streams.Error.Clear() ExecuteCommand '$A=$(testcmd-parserBVT -returntype array); $A[$NONEXISTING_VARIABLE];' $PowerShell.HadErrors | Should -BeTrue $PowerShell.Streams.Error.FullyQualifiedErrorId | Should -Be "NullArrayIndex" } It 'Tests the parser response to ArrayName[. (line 2678)' { { ExecuteCommand '$A=$(testcmd-parserBVT -returntype array); $A[ ;' } | Should -Throw -ErrorId "ParseException" } It 'Tests the parser response to ArrayName[]. (line 2687)' { { ExecuteCommand '$A=$(testcmd-parserBVT -returntype array); $A[] ;' } | Should -Throw -ErrorId "ParseException" } It "Tests function scopes in a script. (line 2800)" -Pending { " function global:func { 'global' }; " + " function func { 'default' }; " + " local:func; " + " script:func; " + " global:func; " | Set-Content -Path $testfile $result = ExecuteCommand "function func { 'notcalled' };. $testfile" $result -join "" | Should -Be ("default", "default", "global" -join "") $result = ExecuteCommand "func" $result | Should -Be "global" } It 'Test piping arguments to a script block. The objects should be accessible from "$input". (line 2870)' { ExecuteCommand '$script = { $input }; $results = @(0, 0), -1 | & $script' $result = ExecuteCommand '$results[0][0]' $result | Should -Be "0" $result = ExecuteCommand '$results[0][1]' $result | Should -Be "0" $result = ExecuteCommand '$results[1]' $result | Should -Be "-1" } It 'Test piping null into a scriptblock. The script block should not be passed anything. (line 2903)' { $result = ExecuteCommand '$() | & { $count = 0; foreach ($i in $input) { $count++ }; $count }' $result | Should -Be "1" $result = ExecuteCommand '$() | & { $input }' $result | Should -BeNullOrEmpty } It 'Test that types in System.dll are found automatically. (line 2951)' { $result = ExecuteCommand '[ System.IO.FileInfo]' $result | Should -Be "System.IO.FileInfo" } Context "Mathematical Operations Tests (starting at line 2975 to line 3036)" { $ArithmeticTests = @( @{ Script = '$a=6; $a -= 2;$a' Expected = 4 } @{ Script = "20 % 6" Expected = "2" } @{ Script = "(20 % 6 * 4 + 2 ) / 2 - 3" Expected = "2" } ) It "<Script> should return <Expected>" -TestCases $ArithmeticTests { param ( $Script, $Expected ) ExecuteCommand $Script | Should -Be $Expected } } It 'This test will call a cmdlet that returns an array and assigns it to a variable. Then it will concatenate this array with itself and check that what results is an array of double the size of the original. (line 3148)' { $result = ExecuteCommand '$list=$(testcmd-parserBVT -ReturnType "array"); $list = $list + $list;$list.length' $result | Should -Be 6 } It "A here string must have one line (line 3266)" { { ExecuteCommand "@`"`"@" } | Should -Throw -ErrorId "ParseException" } It "A here string should not throw on '`$herestr=@`"``n'`"'``n`"@'" { { ExecuteCommand "`$herestr=@`"`n'`"'`n`"@" } | Should -Not -Throw } $TestErrorMisplacedStatement = @( @{ script = "Function foo { [CmdletBinding()] param() DynamicParam {} Hi"; name = "function" } @{ script = "{ begin {} Hi"; name = "script-block" } @{ script = "begin {} Hi"; name = "script-file" } ) It "Throw better error when statement should be put in named blocks - <name>" -TestCases $TestErrorMisplacedStatement { param($script) $err = { ExecuteCommand $script } | Should -Throw -ErrorId "ParseException" -PassThru $err.Exception.InnerException.ErrorRecord.FullyQualifiedErrorId | Should -BeExactly "MissingNamedBlocks" } It "IncompleteParseException should be thrown when only ending curly is missing" { $err = { ExecuteCommand "Function foo { [CmdletBinding()] param() DynamicParam {} " } | Should -Throw -ErrorId "IncompleteParseException" -PassThru $err.Exception.InnerException.ErrorRecord.FullyQualifiedErrorId | Should -BeExactly "MissingEndCurlyBrace" } Context " BeforeAll { $settings = [System.Management.Automation.PSInvocationSettings]::new() $settings.AddToHistory = $true $ps = [powershell]::Create() } AfterAll { $ps.Dispose() } AfterEach { $ps.Commands.Clear() } $TokenResetTests = @( @{ script = " @{ script = " @{ script = "Write-Host 'Hello'`n @{ script = "Write-Host 'Hello'`n ) It "Correctly resets the first and last tokens in the tokenizer after nested scan in script" -TestCases $TokenResetTests { param($script, $firstToken, $lastToken) $ps.AddScript($script) $ps.AddScript("(`$^,`$`$)") $tokens = $ps.Invoke(@(), $settings) $tokens[0] | Should -BeExactly $firstToken $tokens[1] | Should -BeExactly $lastToken } } }
combined_dataset/train/non-malicious/412.ps1
412.ps1
function Read-PsfConfigFile { [CmdletBinding()] param ( [Parameter(Mandatory = $true, ParameterSetName = 'Path')] [string] $Path, [Parameter(Mandatory = $true, ParameterSetName = 'Weblink')] [string] $Weblink, [Parameter(Mandatory = $true, ParameterSetName = 'RawJson')] [string] $RawJson ) function New-ConfigItem { [Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSUseShouldProcessForStateChangingFunctions", "")] [CmdletBinding()] param ( $FullName, $Value, $Type, [switch] $KeepPersisted, [switch] $Enforced, [switch] $Policy ) [pscustomobject]@{ FullName = $FullName Value = $Value Type = $Type KeepPersisted = $KeepPersisted Enforced = $Enforced Policy = $Policy } } function Get-WebContent { [CmdletBinding()] param ( [string] $WebLink ) $webClient = New-Object System.Net.WebClient $webClient.Encoding = [System.Text.Encoding]::UTF8 $webClient.DownloadString($WebLink) } if ($Path) { if (-not (Test-Path $Path)) { return } $data = Get-Content -Path $Path -Encoding UTF8 | ConvertFrom-Json -ErrorAction Stop } if ($Weblink) { $data = Get-WebContent -WebLink $Weblink | ConvertFrom-Json -ErrorAction Stop } if ($RawJson) { $data = $RawJson | ConvertFrom-Json -ErrorAction Stop } foreach ($item in $data) { if (-not $item.Version) { New-ConfigItem -FullName $item.FullName -Value ([PSFramework.Configuration.ConfigurationHost]::ConvertFromPersistedValue($item.Value, $item.Type)) } if ($item.Version -eq 1) { if ((-not $item.Style) -or ($item.Style -eq "Simple")) { New-ConfigItem -FullName $item.FullName -Value $item.Data } else { if (($item.Type -eq "Object") -or ($item.Type -eq 12)) { New-ConfigItem -FullName $item.FullName -Value $item.Value -Type "Object" -KeepPersisted } else { New-ConfigItem -FullName $item.FullName -Value ([PSFramework.Configuration.ConfigurationHost]::ConvertFromPersistedValue($item.Value, $item.Type)) } } } } }
combined_dataset/train/non-malicious/sample_56_64.ps1
sample_56_64.ps1
<# .SYNOPSIS UninstallSyncServiceIIS.ps1 script file This is a place-holder file only fofr agent patch build purposes #> Write-Host "This file functionality is deprecated and is place-holder only" # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBEvnFrRZvKy/OS # C0ygkPg/c9JDdInV1kiXJEGiWC3HZ6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEzMJQPUPOFWDq0gS4hvErW8 # fWJkpZRMljzzwPX7X7H2MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAjHsHRmtuxFPNcY7YhHoxWKHd/MQbkLQti0iIp8qN5ZU4ygdcVEJ69gNu # BDqvG8DjATKsMwFTASU7jbVvRhGOsClba5+4dn4dd98ju3MMsn4mw3lkG/AGPbBd # zYPuhJbpDG6/a4FN3T2nfdtKGQXTJGYs+vB/rZTKX7a5DfVx4g95B7egDsEGYMv/ # BWdHNEmxj1zlq5/LZ+mt5F00j5xX7zPRwDNTxDlrKIN9CoOxGtGs5ZMnbwjIOWb/ # LtL6yBPPQrCUy4mPKMTkXnG0Os2gdanB+tOxoXkStEb+JHDA7tHHG/tvCHjaowlY # 298Sw7tvXPNLeGfd+lxmR/XefAAeMqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDHJEtasASqi6xoNnQZwqrzsYB0un3srJVZ3gfOwGCkOwIGZlcU1ufu # GBMyMDI0MDUzMDIwMzI1Ni42MDJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC # RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ # pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm # scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF # UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr # c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T # 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J # IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz # z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U # NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O # ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2 # UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx # /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh # Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t # 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0 # GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6 # vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu # dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY # nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ # 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z # 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC # V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH # BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf # v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv # E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOoC5JUwIhgPMjAyNDA1MzAxOTQyMTNaGA8yMDI0MDUzMTE5NDIxM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6gLklQIBADAHAgEAAgIMlzAHAgEAAgIRvDAKAgUA # 6gQ2FQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAHwa2uPWSokFmOAcQ6tx # iQ+Y2fvyXxEkWRs9hoL7ISQ575BQbUik567yO3p3G52ZLuS+vU8RVux4xXLF3Ta0 # ApkmgN/TEQsN7JG8gGQOsldBn9fWxGG1Oz2phMJVehHVCadSDps99fTqmgzJ6vJr # jXj50LYEU3Ek9/qH6REwN8leMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgkBlDA8PXJAMt89MXzI69KY9d3OZLl43zM0klrj1CbqIwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xyMuYm # KjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9 # m5ocaIMiAAEAAAHjMCIEIOpqr1oLghYcNfo9Z5UEB92a9myNwrwODudW/66CqPlV # MA0GCSqGSIb3DQEBCwUABIICALdjLV2JNagjzokk1LSgfOVA3dRwXcw4eB2nP+F3 # nRVrJa1KKZcXquSBfhut/cnjKsiUfs5FxUxvM0e1sgXLu471z6mGZAJU5xFkhDiG # hPCqDvpBaReDq6RFveBvfAuFK293K5J4WoCOuMGuk8LzEef+S+XM1oOuPsrnYsCW # qD5MId/woYz7xK+K4gjwK1f+R2no5GA0Wg52eo7PX/p+DGrH/yVz6SITVeMrL7Bc # +e8PQidr1HUeMaldYltTgcBhg2szRXIwdEBNgpDgZiydQy1D3YT+LyfRcyuPdPvC # SOHP+q9WtcfLiJ15a6WEvdzlz5JMadhvk0bTNR9EELRWPUcZjSQ5Nxw4QhCQF3w2 # o08hAOjSMXEV0SLFmeRq7ILFRfAuv3LqWOakaTNx9YjBxOIq7wxA43FRp05QnkBg # 3k/3IMgpAqOIClLmiIzBS6emKNqq83BmHFexQPThJi1L/9HeCTvTh7qEXcahCvOH # zxozxOMfWyDsct/vDmAM2ZynVtpbVPDJMdeQ3sIpq0ILj09KPzIWDfR+Ufqarn2O # thgcJfywl4QkNJAUcHIkwqsBS0983YrJZoqGwCuFfRZ2f5cYhJYIhvyRxkq+OcXR # drUDHSVJSjzjanElUT+SlB9Xo73QUzQOciHSeSu8cGmm5zZjKTQHopR3qhq4A2y4 # Vz6c # SIG # End signature block
combined_dataset/train/non-malicious/sample_18_35.ps1
sample_18_35.ps1
# # Module manifest for module 'OCI.PSModules.Common' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Common.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Corporation 2020. All rights reserved.' # Description of the functionality provided by this module Description = 'OCI Common module exports Cmdlets that manages features offered by OCI Modules for Powershell like History Store, OCI Configuration file setup and Per-Session Region/Config/Profile preferences. Common module also contains some functionalties that are common to all OCI Service modules, therefore all OCI Service modules depends on Common module.' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Common.dll', 'assemblies/BouncyCastle.Crypto.dll', 'assemblies/NLog.dll', 'assemblies/Polly.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'OCI.PSModules.Common.format.ps1xml' # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @() # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCICmdletHistory', 'Set-OCICmdletHistory', 'Clear-OCICmdletHistory', 'Get-OCIClientSession', 'Set-OCIClientSession', 'Set-OCIClientConfig', 'New-OCIClientKeys', 'Clear-OCIClientSession', 'Register-OCIRealm', 'Register-OCIRegion', 'Get-OCIRegion', 'Get-OCIRegionsList', 'Get-OCIRealm', 'Get-OCIRealmsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Common' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_1_0.ps1
sample_1_0.ps1
# # Module manifest for module 'OCI.PSModules.Clusterplacementgroups' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Clusterplacementgroups.dll' # Version number of this module. ModuleVersion = '92.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6f928c67-e221-4d6b-8353-9cd39e4754c1' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Clusterplacementgroups Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '92.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Clusterplacementgroups.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCIClusterplacementgroupsClusterPlacementGroup', 'Get-OCIClusterplacementgroupsClusterPlacementGroup', 'Get-OCIClusterplacementgroupsList', 'Get-OCIClusterplacementgroupsWorkRequest', 'Get-OCIClusterplacementgroupsWorkRequestErrorsList', 'Get-OCIClusterplacementgroupsWorkRequestLogsList', 'Get-OCIClusterplacementgroupsWorkRequestsList', 'Invoke-OCIClusterplacementgroupsDeactivateClusterPlacementGroup', 'Move-OCIClusterplacementgroupsClusterPlacementGroupCompartment', 'New-OCIClusterplacementgroupsClusterPlacementGroup', 'Remove-OCIClusterplacementgroupsClusterPlacementGroup', 'Stop-OCIClusterplacementgroupsWorkRequest', 'Update-OCIClusterplacementgroupsClusterPlacementGroup' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Clusterplacementgroups' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/repr_1.ps1
repr_1.ps1
function repr { [CmdletBinding()] [OutputType([string])] Param( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true)] $InputObject) process { if($null -eq $InputObject) { $PSCmdlet.WriteObject('$null') } elseif($InputObject -is [bool]) { $PSCmdlet.WriteObject('$' + $InputObject.ToString().ToLowerInvariant()) } elseif($InputObject -is [scriptblock]) { $PSCmdlet.WriteObject("{$InputObject}") } elseif($InputObject -is [string]) { $PSCmdlet.WriteObject("'$InputObject'") } else { $PSCmdlet.WriteObject($InputObject.ToString()) } } }
combined_dataset/train/non-malicious/2452.ps1
2452.ps1
[CmdletBinding()] param () begin { $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop Set-StrictMode -Version Latest function Get-LoggedOnUserSID { [CmdletBinding()] param () process { try { if (-not (Get-PSDrive -Name HKU -ErrorAction SilentlyContinue)) { New-PSDrive -Name HKU -PSProvider Registry -Root Registry::HKEY_USERS | Out-Null } (Get-ChildItem HKU: | where { $_.Name -match 'S-\d-\d+-(\d+-){1,14}\d+$' }).PSChildName } catch { Write-Warning -Message "$($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" } } } function Set-RegistryValueForAllUsers { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [hashtable[]]$RegistryInstance, [switch]$Remove ) begin { if (-not (Get-PSDrive -Name HKU -ErrorAction SilentlyContinue)) { New-PSDrive -Name HKU -PSProvider Registry -Root Registry::HKEY_USERS | Out-Null } } process { try { $LoggedOnSids = Get-LoggedOnUserSID if ($LoggedOnSids -is [string]) { Write-Verbose -Message "Found 1 logged on user SID" } else { Write-Verbose -Message "Found $($LoggedOnSids.Count) logged on user SIDs" } foreach ($sid in $LoggedOnSids) { Write-Verbose -Message "Loading the user registry hive for the logged on SID $sid" foreach ($instance in $RegistryInstance) { if ($Remove.IsPresent) { Write-Verbose -Message "Removing registry key '$($instance.path)'" Remove-Item -Path "HKU:\$sid\$($instance.Path)" -Recurse -Force -ea 'SilentlyContinue' } else { if (!(Get-Item -Path "HKU:\$sid\$($instance.Path)" -ea 'SilentlyContinue')) { Write-Verbose -Message "The registry key HKU:\$sid\$($instance.Path) does not exist. Creating..." New-Item -Path "HKU:\$sid\$($instance.Path | Split-Path -Parent)" -Name ($instance.Path | Split-Path -Leaf) -Force | Out-Null } else { Write-Verbose -Message "The registry key HKU:\$sid\$($instance.Path) already exists. No need to create." } Write-Verbose -Message "Setting registry value $($instance.Name) at path HKU:\$sid\$($instance.Path) to $($instance.Value)" Set-ItemProperty -Path "HKU:\$sid\$($instance.Path)" -Name $instance.Name -Value $instance.Value -Type $instance.Type -Force } } } foreach ($instance in $RegistryInstance) { if ($Remove.IsPresent) { if ($instance.Path.Split('\')[0] -eq 'SOFTWARE' -and ((Get-Architecture) -eq 'x64')) { $Split = $instance.Path.Split('\') $x86Path = "HKCU\SOFTWARE\Wow6432Node\{0}" -f ($Split[1..($Split.Length)] -join '\') $CommandLine = "reg delete `"{0}`" /f && reg delete `"{1}`" /f" -f "HKCU\$($instance.Path)", $x86Path } else { $CommandLine = "reg delete `"{0}`" /f" -f "HKCU\$($instance.Path)" } } else { switch ($instance.Type) { 'String' { $RegValueType = 'REG_SZ' } 'Dword' { $RegValueType = 'REG_DWORD' } 'Binary' { $RegValueType = 'REG_BINARY' } 'ExpandString' { $RegValueType = 'REG_EXPAND_SZ' } 'MultiString' { $RegValueType = 'REG_MULTI_SZ' } default { throw "Registry type '$($instance.Type)' not recognized" } } if (!(Get-Item -Path "HKCU:\$($instance.Path)" -ea 'SilentlyContinue')) { Write-Verbose -Message "The registry key 'HKCU:\$($instance.Path)'' does not exist. Creating..." New-Item -Path "HKCU:\$($instance.Path) | Split-Path -Parent)" -Name ("HKCU:\$($instance.Path)" | Split-Path -Leaf) -Force | Out-Null } if (-not $instance.Value) { $instance.Value = '""' } $CommandLine = "reg add `"{0}`" /v {1} /t {2} /d {3} /f" -f "HKCU\$($instance.Path)", $instance.Name, $RegValueType, $instance.Value } Set-AllUserStartupAction -CommandLine $CommandLine } } catch { Write-Warning -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" $false } } } function Set-AllUserStartupAction { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string]$CommandLine ) process { try { $Guid = [guid]::NewGuid().Guid Write-Verbose -Message "Created GUID '$Guid' to use for Active Setup" $ActiveSetupRegParentPath = 'HKLM:\Software\Microsoft\Active Setup\Installed Components' New-Item -Path $ActiveSetupRegParentPath -Name $Guid -Force | Out-Null $ActiveSetupRegPath = "HKLM:\Software\Microsoft\Active Setup\Installed Components\$Guid" Write-Verbose -Message "Using registry path '$ActiveSetupRegPath'" Write-Verbose -Message "Setting command line registry value to '$CommandLine'" Set-ItemProperty -Path $ActiveSetupRegPath -Name '(Default)' -Value 'All Users Startup Action' -Force Set-ItemProperty -Path $ActiveSetupRegPath -Name 'Version' -Value '1' -Force Set-ItemProperty -Path $ActiveSetupRegPath -Name 'StubPath' -Value $CommandLine -Force Write-Verbose -Message 'Done' } catch { Write-Warning -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" $false } } } } process { try { $Instance = @{ 'Name' = 'AutoConfigURL'; 'Type' = 'String'; 'Path' = 'SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings'; 'Value' = '' } Set-RegistryValueForAllUsers -RegistryInstance $Instance } catch { Write-Error "$($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" } }
combined_dataset/train/non-malicious/Get-Scope_4.ps1
Get-Scope_4.ps1
#function Get-Scope { #.Synopsis # Determine the scope of execution (are you in a module? how many scope layers deep are you?) #.Parameter Invocation # In order to correctly determine the scope, this function requires that you pass in the $MyInvocation variable when you call it. #.Parameter ToHost # If you just want to *see* the value in the console to debug something, you can pass this switch (and optionally, set the foreground/background colors) #.Parameter Foreground # The Foreground color of host output #.Parameter Background # The Background color of host output #.Example # $scope = Get-Scope $MyInvocation # # Description # ----------- # Call Get-Scope and store the output so you can test if you're in module scope, etc. #.Example # Get-Scope $MyInvocation -ToHost Magenta DarkBlue # # Description # ----------- # Call Get-Scope and write the output to host, specifying the foreground and background colors [CmdletBinding()] param( [Parameter(Position=0,Mandatory=$false)] [System.Management.Automation.InvocationInfo]$Invocation = $((Get-Variable -scope 1 'MyInvocation').Value) , [Parameter(ParameterSetName="Debugging")] [Switch]$ToHost , [Parameter(Position=1,ParameterSetName="Debugging")] [ConsoleColor]$Foreground = "Cyan" , [Parameter(Position=2,ParameterSetName="Debugging")] [ConsoleColor]$Background = "Black" ) end { function Get-ScopeDepth { trap { continue } $depth = 0 do { Set-Variable scope_test -Value $depth -Scope ($depth++) } while($?) return $depth - 1 } $depth = . Get-ScopeDepth $callstack = Get-PSCallStack $IsInteractive = $true foreach ($entry in $callStack[1..($callStack.Count - 1)]) { write-host $($entry | fl | out-string) -fore Cyan if((@('&','.','<ScriptBlock>') -contains $entry.Command)) { # @('&','.') -contains $entry.Position.Text[0] continue } if (($entry.Command -eq 'prompt') -or ($entry.Location -eq 'prompt')) { write-host "Found the prompt, we're done here" break } $IsInteractive = $false break } $IsGlobal = 0 -eq (Get-Variable scope_test -Scope global).Value Remove-Variable scope_test Remove-Variable scope_test -Scope global -EA 0 $PSScope = New-Object PSObject -Property @{ Module = $Invocation.MyCommand.Module IsModuleScope = [bool]$Invocation.MyCommand.Module IsGlobalScope = $IsGlobal IsInteractive = $IsInteractive ScopeDepth = $depth PipelinePosition = $Invocation.PipelinePosition PipelineLength = $Invocation.PipelineLength StackDepth = $callstack.Count - 1 Invocation = $Invocation CallStack = $callstack } if($ToHost) { &{ $PSScope, $PSScope.Invocation | Out-String } | Write-Host -Foreground $Foreground -Background $Background } else { $PSScope } } #}
combined_dataset/train/non-malicious/Start-AppVTestMode.ps1
Start-AppVTestMode.ps1
#This script is designed to set a test server to use a specific directory for App-V Apps, to enable testing #Without having to publish to an external repository. #REQUIREMENTS: Windows 2008 ##FUNCTIONS # DESCRIPTION: Displays the attention message box & checks to see if the user clicks the ok button. function Show-MessageBox ($title, $msg) { [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") | Out-Null [Windows.Forms.MessageBox]::Show($msg, $title, [Windows.Forms.MessageBoxButtons]::OK, [System.Windows.Forms.MessageBoxIcon]::Warning, [System.Windows.Forms.MessageBoxDefaultButton]::Button1, [System.Windows.Forms.MessageBoxOptions]::DefaultDesktopOnly) | Out-Null } function Show-InformationBox ([string]$Title,[string]$Message) { [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") | Out-Null [Windows.Forms.MessageBox]::Show($Message, $Title, [Windows.Forms.MessageBoxButtons]::OK, [System.Windows.Forms.MessageBoxIcon]::Information, [System.Windows.Forms.MessageBoxDefaultButton]::Button1, [System.Windows.Forms.MessageBoxOptions]::DefaultDesktopOnly) | Out-Null } ##VARIABLES #App-V Test Repository $Repository = "\\\\server\\share\\AppVRepository\\2-TestPackages" #App-V Client Registry Path $AppVRegRoot = "HKLM:\\SOFTWARE\\Microsoft\\SoftGrid\\4.5\\Client" # Different App-V Client Registry for x64 systems if ((Get-WMIObject win32_operatingsystem).OSArchitecture -match "64-bit") { $AppVRegRoot = "HKLM:\\SOFTWARE\\WOW6432Node\\Microsoft\\SoftGrid\\4.5\\Client" } ##SCRIPT #Start Transaction $transEnterAppVTestMode = start-transaction #Enter AppV Registry Path set-location $AppVRegRoot #Get Original App-V Settings $ASROriginalSetting = (get-itemproperty Configuration).ApplicationSourceRoot $AIFSOriginalSetting = (get-itemproperty Configuration).AllowIndependentFileStreaming #Set AppV Variables set-itemproperty Configuration -name "ApplicationSourceRoot" -value $repository set-itemproperty Configuration -name "IconSourceRoot" -value $repository #Delete all App-V Applications sftmime DELETE obj:app /global #Get App Manifest Files from Repository and import them set-location C: pwd set-location $repository pwd $i=1 get-childitem $repository | where {$_.Name -match "manifest.xml"} | foreach { echo $_.Name sftmime ADD PACKAGE:TestApp$i /manifest $_.Name /global $i++ } #Display Dialog box that the test mode is active Show-InformationBox "App-V Testing Mode is active" "Apps will be sourced from $Repository. NOTE: File Associations (launching programs by double-clicking their files like .docx) will not be testable due to SCCM vAppLauncher bug Click OK to return to normal mode" #Set AppV Variable back to original setting and close script. set-location $AppVRegRoot pwd set-itemproperty Configuration -name "ApplicationSourceRoot" -value "" set-itemproperty Configuration -name "IconSourceRoot" -value "" #Delete all App-V Applications sftmime DELETE obj:app /global
combined_dataset/train/non-malicious/sample_32_25.ps1
sample_32_25.ps1
# # Module manifest for module 'OCI.PSModules.Database' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Database.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e1b520e7-13c2-41a0-be48-3eacc401dff5' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Database Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Database.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatabaseStorageCapacityCloudExadataInfrastructure', 'Add-OCIDatabaseStorageCapacityExadataInfrastructure', 'Add-OCIDatabaseVirtualMachineToCloudVmCluster', 'Add-OCIDatabaseVirtualMachineToVmCluster', 'Complete-OCIDatabaseExternalBackupJob', 'Confirm-OCIDatabaseVmClusterNetwork', 'Disable-OCIDatabaseAutonomousDatabaseManagement', 'Disable-OCIDatabaseAutonomousDatabaseOperationsInsights', 'Disable-OCIDatabaseExternalContainerDatabaseDatabaseManagement', 'Disable-OCIDatabaseExternalContainerDatabaseStackMonitoring', 'Disable-OCIDatabaseExternalNonContainerDatabaseDatabaseManagement', 'Disable-OCIDatabaseExternalNonContainerDatabaseOperationsInsights', 'Disable-OCIDatabaseExternalNonContainerDatabaseStackMonitoring', 'Disable-OCIDatabaseExternalPluggableDatabaseDatabaseManagement', 'Disable-OCIDatabaseExternalPluggableDatabaseOperationsInsights', 'Disable-OCIDatabaseExternalPluggableDatabaseStackMonitoring', 'Disable-OCIDatabaseManagement', 'Disable-OCIDatabasePluggableDatabaseManagement', 'Edit-OCIDatabaseManagement', 'Edit-OCIDatabasePluggableDatabaseManagement', 'Enable-OCIDatabaseAutonomousDatabaseManagement', 'Enable-OCIDatabaseAutonomousDatabaseOperationsInsights', 'Enable-OCIDatabaseExadataInfrastructure', 'Enable-OCIDatabaseExternalContainerDatabaseDatabaseManagement', 'Enable-OCIDatabaseExternalContainerDatabaseStackMonitoring', 'Enable-OCIDatabaseExternalNonContainerDatabaseDatabaseManagement', 'Enable-OCIDatabaseExternalNonContainerDatabaseOperationsInsights', 'Enable-OCIDatabaseExternalNonContainerDatabaseStackMonitoring', 'Enable-OCIDatabaseExternalPluggableDatabaseDatabaseManagement', 'Enable-OCIDatabaseExternalPluggableDatabaseOperationsInsights', 'Enable-OCIDatabaseExternalPluggableDatabaseStackMonitoring', 'Enable-OCIDatabaseManagement', 'Enable-OCIDatabasePluggableDatabaseManagement', 'Get-OCIDatabase', 'Get-OCIDatabaseApplicationVip', 'Get-OCIDatabaseApplicationVipsList', 'Get-OCIDatabaseAutonomousContainerDatabase', 'Get-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation', 'Get-OCIDatabaseAutonomousContainerDatabaseDataguardAssociationsList', 'Get-OCIDatabaseAutonomousContainerDatabaseResourceUsage', 'Get-OCIDatabaseAutonomousContainerDatabasesList', 'Get-OCIDatabaseAutonomousContainerDatabaseVersionsList', 'Get-OCIDatabaseAutonomousDatabase', 'Get-OCIDatabaseAutonomousDatabaseBackup', 'Get-OCIDatabaseAutonomousDatabaseBackupsList', 'Get-OCIDatabaseAutonomousDatabaseCharacterSetsList', 'Get-OCIDatabaseAutonomousDatabaseClonesList', 'Get-OCIDatabaseAutonomousDatabaseDataguardAssociation', 'Get-OCIDatabaseAutonomousDatabaseDataguardAssociationsList', 'Get-OCIDatabaseAutonomousDatabaseRefreshableClonesList', 'Get-OCIDatabaseAutonomousDatabaseRegionalWallet', 'Get-OCIDatabaseAutonomousDatabasesList', 'Get-OCIDatabaseAutonomousDatabaseWallet', 'Get-OCIDatabaseAutonomousDbPreviewVersionsList', 'Get-OCIDatabaseAutonomousDbVersionsList', 'Get-OCIDatabaseAutonomousExadataInfrastructure', 'Get-OCIDatabaseAutonomousExadataInfrastructureShapesList', 'Get-OCIDatabaseAutonomousExadataInfrastructuresList', 'Get-OCIDatabaseAutonomousPatch', 'Get-OCIDatabaseAutonomousVirtualMachine', 'Get-OCIDatabaseAutonomousVirtualMachinesList', 'Get-OCIDatabaseAutonomousVmCluster', 'Get-OCIDatabaseAutonomousVmClusterAcdResourceUsageList', 'Get-OCIDatabaseAutonomousVmClusterResourceUsage', 'Get-OCIDatabaseAutonomousVmClustersList', 'Get-OCIDatabaseBackup', 'Get-OCIDatabaseBackupDestination', 'Get-OCIDatabaseBackupDestinationList', 'Get-OCIDatabaseBackupsList', 'Get-OCIDatabaseCloudAutonomousVmCluster', 'Get-OCIDatabaseCloudAutonomousVmClusterAcdResourceUsageList', 'Get-OCIDatabaseCloudAutonomousVmClusterResourceUsage', 'Get-OCIDatabaseCloudAutonomousVmClustersList', 'Get-OCIDatabaseCloudExadataInfrastructure', 'Get-OCIDatabaseCloudExadataInfrastructuresList', 'Get-OCIDatabaseCloudExadataInfrastructureUnallocatedResources', 'Get-OCIDatabaseCloudVmCluster', 'Get-OCIDatabaseCloudVmClusterIormConfig', 'Get-OCIDatabaseCloudVmClustersList', 'Get-OCIDatabaseCloudVmClusterUpdate', 'Get-OCIDatabaseCloudVmClusterUpdateHistoryEntriesList', 'Get-OCIDatabaseCloudVmClusterUpdateHistoryEntry', 'Get-OCIDatabaseCloudVmClusterUpdatesList', 'Get-OCIDatabaseConsoleConnection', 'Get-OCIDatabaseConsoleConnectionsList', 'Get-OCIDatabaseConsoleHistoriesList', 'Get-OCIDatabaseConsoleHistory', 'Get-OCIDatabaseConsoleHistoryContent', 'Get-OCIDatabaseContainerDatabasePatchesList', 'Get-OCIDatabaseDataGuardAssociation', 'Get-OCIDatabaseDataGuardAssociationsList', 'Get-OCIDatabaseDbHome', 'Get-OCIDatabaseDbHomePatch', 'Get-OCIDatabaseDbHomePatchesList', 'Get-OCIDatabaseDbHomePatchHistoryEntriesList', 'Get-OCIDatabaseDbHomePatchHistoryEntry', 'Get-OCIDatabaseDbHomesList', 'Get-OCIDatabaseDbNode', 'Get-OCIDatabaseDbNodesList', 'Get-OCIDatabaseDbServer', 'Get-OCIDatabaseDbServersList', 'Get-OCIDatabaseDbSystem', 'Get-OCIDatabaseDbSystemComputePerformancesList', 'Get-OCIDatabaseDbSystemPatch', 'Get-OCIDatabaseDbSystemPatchesList', 'Get-OCIDatabaseDbSystemPatchHistoryEntriesList', 'Get-OCIDatabaseDbSystemPatchHistoryEntry', 'Get-OCIDatabaseDbSystemShapesList', 'Get-OCIDatabaseDbSystemsList', 'Get-OCIDatabaseDbSystemStoragePerformancesList', 'Get-OCIDatabaseDbSystemUpgradeHistoryEntriesList', 'Get-OCIDatabaseDbSystemUpgradeHistoryEntry', 'Get-OCIDatabaseDbVersionsList', 'Get-OCIDatabaseExadataInfrastructure', 'Get-OCIDatabaseExadataInfrastructureOcpus', 'Get-OCIDatabaseExadataInfrastructuresList', 'Get-OCIDatabaseExadataInfrastructureUnAllocatedResources', 'Get-OCIDatabaseExadataIormConfig', 'Get-OCIDatabaseExternalBackupJob', 'Get-OCIDatabaseExternalContainerDatabase', 'Get-OCIDatabaseExternalContainerDatabasesList', 'Get-OCIDatabaseExternalDatabaseConnector', 'Get-OCIDatabaseExternalDatabaseConnectorsList', 'Get-OCIDatabaseExternalNonContainerDatabase', 'Get-OCIDatabaseExternalNonContainerDatabasesList', 'Get-OCIDatabaseExternalPluggableDatabase', 'Get-OCIDatabaseExternalPluggableDatabasesList', 'Get-OCIDatabaseFlexComponentsList', 'Get-OCIDatabaseGiVersionsList', 'Get-OCIDatabaseInfrastructureTargetVersions', 'Get-OCIDatabaseKeyStore', 'Get-OCIDatabaseKeyStoresList', 'Get-OCIDatabaseMaintenanceRun', 'Get-OCIDatabaseMaintenanceRunHistory', 'Get-OCIDatabaseMaintenanceRunHistoryList', 'Get-OCIDatabaseMaintenanceRunsList', 'Get-OCIDatabaseOneoffPatch', 'Get-OCIDatabaseOneoffPatchesList', 'Get-OCIDatabasePdbConversionHistoryEntriesList', 'Get-OCIDatabasePdbConversionHistoryEntry', 'Get-OCIDatabasePluggableDatabase', 'Get-OCIDatabasePluggableDatabasesList', 'Get-OCIDatabasesList', 'Get-OCIDatabaseSoftwareImage', 'Get-OCIDatabaseSoftwareImagesList', 'Get-OCIDatabaseSystemVersionsList', 'Get-OCIDatabaseUpgradeHistoryEntriesList', 'Get-OCIDatabaseUpgradeHistoryEntry', 'Get-OCIDatabaseVmCluster', 'Get-OCIDatabaseVmClusterNetwork', 'Get-OCIDatabaseVmClusterNetworksList', 'Get-OCIDatabaseVmClusterPatch', 'Get-OCIDatabaseVmClusterPatchesList', 'Get-OCIDatabaseVmClusterPatchHistoryEntriesList', 'Get-OCIDatabaseVmClusterPatchHistoryEntry', 'Get-OCIDatabaseVmClustersList', 'Get-OCIDatabaseVmClusterUpdate', 'Get-OCIDatabaseVmClusterUpdateHistoryEntriesList', 'Get-OCIDatabaseVmClusterUpdateHistoryEntry', 'Get-OCIDatabaseVmClusterUpdatesList', 'Invoke-OCIDatabaseAutonomousDatabaseManualRefresh', 'Invoke-OCIDatabaseCheckExternalDatabaseConnectorConnectionStatus', 'Invoke-OCIDatabaseConfigureAutonomousDatabaseVaultKey', 'Invoke-OCIDatabaseConfigureSaasAdminUser', 'Invoke-OCIDatabaseConvertToPdb', 'Invoke-OCIDatabaseConvertToRegularPluggableDatabase', 'Invoke-OCIDatabaseDbNodeAction', 'Invoke-OCIDatabaseDownloadExadataInfrastructureConfigFile', 'Invoke-OCIDatabaseDownloadOneoffPatch', 'Invoke-OCIDatabaseDownloadValidationReport', 'Invoke-OCIDatabaseDownloadVmClusterNetworkConfigFile', 'Invoke-OCIDatabaseFailoverAutonomousContainerDatabaseDataguardAssociation', 'Invoke-OCIDatabaseFailOverAutonomousDatabase', 'Invoke-OCIDatabaseFailoverDataGuardAssociation', 'Invoke-OCIDatabaseLaunchAutonomousExadataInfrastructure', 'Invoke-OCIDatabaseLocalClonePluggableDatabase', 'Invoke-OCIDatabaseMigrateExadataDbSystemResourceModel', 'Invoke-OCIDatabaseMigrateVaultKey', 'Invoke-OCIDatabaseRefreshPluggableDatabase', 'Invoke-OCIDatabaseReinstateAutonomousContainerDatabaseDataguardAssociation', 'Invoke-OCIDatabaseReinstateDataGuardAssociation', 'Invoke-OCIDatabaseRemoteClonePluggableDatabase', 'Invoke-OCIDatabaseResizeVmClusterNetwork', 'Invoke-OCIDatabaseResourcePoolShapes', 'Invoke-OCIDatabaseRotateAutonomousContainerDatabaseEncryptionKey', 'Invoke-OCIDatabaseRotateAutonomousDatabaseEncryptionKey', 'Invoke-OCIDatabaseRotateAutonomousVmClusterOrdsCerts', 'Invoke-OCIDatabaseRotateAutonomousVmClusterSslCerts', 'Invoke-OCIDatabaseRotateCloudAutonomousVmClusterOrdsCerts', 'Invoke-OCIDatabaseRotateCloudAutonomousVmClusterSslCerts', 'Invoke-OCIDatabaseRotateOrdsCerts', 'Invoke-OCIDatabaseRotatePluggableDatabaseEncryptionKey', 'Invoke-OCIDatabaseRotateSslCerts', 'Invoke-OCIDatabaseRotateVaultKey', 'Invoke-OCIDatabaseSaasAdminUserStatus', 'Invoke-OCIDatabaseScanExternalContainerDatabasePluggableDatabases', 'Invoke-OCIDatabaseShrinkAutonomousDatabase', 'Invoke-OCIDatabaseSwitchoverAutonomousContainerDatabaseDataguardAssociation', 'Invoke-OCIDatabaseSwitchoverAutonomousDatabase', 'Invoke-OCIDatabaseSwitchoverDataGuardAssociation', 'Invoke-OCIDatabaseTerminateAutonomousContainerDatabase', 'Invoke-OCIDatabaseTerminateAutonomousExadataInfrastructure', 'Invoke-OCIDatabaseTerminateDbSystem', 'Invoke-OCIDatabaseUpgradeDatabase', 'Invoke-OCIDatabaseUpgradeDbSystem', 'Move-OCIDatabaseAutonomousContainerDatabaseCompartment', 'Move-OCIDatabaseAutonomousDatabaseCompartment', 'Move-OCIDatabaseAutonomousExadataInfrastructureCompartment', 'Move-OCIDatabaseAutonomousVmClusterCompartment', 'Move-OCIDatabaseBackupDestinationCompartment', 'Move-OCIDatabaseCloudAutonomousVmClusterCompartment', 'Move-OCIDatabaseCloudExadataInfrastructureCompartment', 'Move-OCIDatabaseCloudVmClusterCompartment', 'Move-OCIDatabaseDataguardRole', 'Move-OCIDatabaseDbSystemCompartment', 'Move-OCIDatabaseDisasterRecoveryConfiguration', 'Move-OCIDatabaseExadataInfrastructureCompartment', 'Move-OCIDatabaseExternalContainerDatabaseCompartment', 'Move-OCIDatabaseExternalNonContainerDatabaseCompartment', 'Move-OCIDatabaseExternalPluggableDatabaseCompartment', 'Move-OCIDatabaseKeyStoreCompartment', 'Move-OCIDatabaseKeyStoreType', 'Move-OCIDatabaseOneoffPatchCompartment', 'Move-OCIDatabaseSoftwareImageCompartment', 'Move-OCIDatabaseVmClusterCompartment', 'New-OCIDatabase', 'New-OCIDatabaseApplicationVip', 'New-OCIDatabaseAutonomousContainerDatabase', 'New-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation', 'New-OCIDatabaseAutonomousDatabase', 'New-OCIDatabaseAutonomousDatabaseBackup', 'New-OCIDatabaseAutonomousDatabaseWallet', 'New-OCIDatabaseAutonomousVmCluster', 'New-OCIDatabaseBackup', 'New-OCIDatabaseBackupDestination', 'New-OCIDatabaseCloudAutonomousVmCluster', 'New-OCIDatabaseCloudExadataInfrastructure', 'New-OCIDatabaseCloudVmCluster', 'New-OCIDatabaseConsoleConnection', 'New-OCIDatabaseConsoleHistory', 'New-OCIDatabaseDataGuardAssociation', 'New-OCIDatabaseDbHome', 'New-OCIDatabaseDbSystem', 'New-OCIDatabaseExadataInfrastructure', 'New-OCIDatabaseExternalBackupJob', 'New-OCIDatabaseExternalContainerDatabase', 'New-OCIDatabaseExternalDatabaseConnector', 'New-OCIDatabaseExternalNonContainerDatabase', 'New-OCIDatabaseExternalPluggableDatabase', 'New-OCIDatabaseKeyStore', 'New-OCIDatabaseMaintenanceRun', 'New-OCIDatabaseOneoffPatch', 'New-OCIDatabasePluggableDatabase', 'New-OCIDatabaseRecommendedVmClusterNetwork', 'New-OCIDatabaseSoftwareImage', 'New-OCIDatabaseVmCluster', 'New-OCIDatabaseVmClusterNetwork', 'Register-OCIDatabaseAutonomousDatabaseDataSafe', 'Remove-OCIDatabase', 'Remove-OCIDatabaseApplicationVip', 'Remove-OCIDatabaseAutonomousDatabase', 'Remove-OCIDatabaseAutonomousDatabaseBackup', 'Remove-OCIDatabaseAutonomousVmCluster', 'Remove-OCIDatabaseBackup', 'Remove-OCIDatabaseBackupDestination', 'Remove-OCIDatabaseCloudAutonomousVmCluster', 'Remove-OCIDatabaseCloudExadataInfrastructure', 'Remove-OCIDatabaseCloudVmCluster', 'Remove-OCIDatabaseConsoleConnection', 'Remove-OCIDatabaseConsoleHistory', 'Remove-OCIDatabaseDbHome', 'Remove-OCIDatabaseExadataInfrastructure', 'Remove-OCIDatabaseExternalContainerDatabase', 'Remove-OCIDatabaseExternalDatabaseConnector', 'Remove-OCIDatabaseExternalNonContainerDatabase', 'Remove-OCIDatabaseExternalPluggableDatabase', 'Remove-OCIDatabaseKeyStore', 'Remove-OCIDatabaseOneoffPatch', 'Remove-OCIDatabasePluggableDatabase', 'Remove-OCIDatabaseSoftwareImage', 'Remove-OCIDatabaseVirtualMachineFromCloudVmCluster', 'Remove-OCIDatabaseVirtualMachineFromVmCluster', 'Remove-OCIDatabaseVmCluster', 'Remove-OCIDatabaseVmClusterNetwork', 'Restart-OCIDatabaseAutonomousContainerDatabase', 'Restart-OCIDatabaseAutonomousDatabase', 'Restore-OCIDatabase', 'Restore-OCIDatabaseAutonomousDatabase', 'Start-OCIDatabaseAutonomousDatabase', 'Start-OCIDatabasePluggableDatabase', 'Stop-OCIDatabaseAutonomousDatabase', 'Stop-OCIDatabaseBackup', 'Stop-OCIDatabasePluggableDatabase', 'Unregister-OCIDatabaseAutonomousDatabaseDataSafe', 'Update-OCIDatabase', 'Update-OCIDatabaseAutonomousContainerDatabase', 'Update-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation', 'Update-OCIDatabaseAutonomousDatabase', 'Update-OCIDatabaseAutonomousDatabaseBackup', 'Update-OCIDatabaseAutonomousDatabaseRegionalWallet', 'Update-OCIDatabaseAutonomousDatabaseWallet', 'Update-OCIDatabaseAutonomousExadataInfrastructure', 'Update-OCIDatabaseAutonomousVmCluster', 'Update-OCIDatabaseBackupDestination', 'Update-OCIDatabaseCloudAutonomousVmCluster', 'Update-OCIDatabaseCloudExadataInfrastructure', 'Update-OCIDatabaseCloudVmCluster', 'Update-OCIDatabaseCloudVmClusterIormConfig', 'Update-OCIDatabaseConsoleConnection', 'Update-OCIDatabaseConsoleHistory', 'Update-OCIDatabaseDataGuardAssociation', 'Update-OCIDatabaseDbHome', 'Update-OCIDatabaseDbNode', 'Update-OCIDatabaseDbSystem', 'Update-OCIDatabaseExadataInfrastructure', 'Update-OCIDatabaseExadataIormConfig', 'Update-OCIDatabaseExternalContainerDatabase', 'Update-OCIDatabaseExternalDatabaseConnector', 'Update-OCIDatabaseExternalNonContainerDatabase', 'Update-OCIDatabaseExternalPluggableDatabase', 'Update-OCIDatabaseKeyStore', 'Update-OCIDatabaseMaintenanceRun', 'Update-OCIDatabaseOneoffPatch', 'Update-OCIDatabasePluggableDatabase', 'Update-OCIDatabaseSoftwareImage', 'Update-OCIDatabaseVmCluster', 'Update-OCIDatabaseVmClusterNetwork' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Database' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }