full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/1807.ps1
1807.ps1
Describe "Get-EventLog cmdlet tests" -Tags @('CI', 'RequireAdminOnWindows') { BeforeAll { $defaultParamValues = $PSdefaultParameterValues.Clone() $PSDefaultParameterValues["it:skip"] = !$IsWindows -or $IsCoreCLR } AfterAll { $global:PSDefaultParameterValues = $defaultParamValues } It "should return an array of eventlogs objects when called with -AsString parameter" -Pending:($True) { { $result=Get-EventLog -AsString -ErrorAction Stop } | Should -Not -Throw $result | Should -Not -BeNullOrEmpty ,$result | Should -BeOfType "System.Array" $result | Should -BeExactly "Application" $result.Count | Should -BeGreaterThan 3 } It "should return a list of eventlog objects when called with -List parameter" -Pending:($True) { { $result=Get-EventLog -List -ErrorAction Stop } | Should -Not -Throw $result | Should -Not -BeNullOrEmpty ,$result | Should -BeOfType "System.Array" {$logs=$result | Select-Object -ExpandProperty Log} | Should -Not -Throw $logs | Should -BeExactly "System" $logs.Count | Should -BeGreaterThan 3 } It "should be able to Get-EventLog -LogName Application -Newest 100" -Pending:($True) { { $result=get-eventlog -LogName Application -Newest 100 -ErrorAction Stop } | Should -Not -Throw $result | Should -Not -BeNullOrEmpty $result.Length | Should -BeLessThan 100 $result[0] | Should -BeOfType "EventLogEntry" } It "should throw 'AmbiguousParameterSetException' when called with both -LogName and -List parameters" -Pending:($True) { { Get-EventLog -LogName System -List -ErrorAction Stop } | Should -Throw -ErrorId "AmbiguousParameterSet,Microsoft.PowerShell.Commands.GetEventLogCommand" } It "should be able to Get-EventLog -LogName * with multiple matches" -Pending:($True) { { $result=get-eventlog -LogName * -ErrorAction Stop } | Should -Not -Throw $result | Should -Not -BeNullOrEmpty $result | Should -BeExactly "Security" $result.Count | Should -BeGreaterThan 3 } It "should throw 'InvalidOperationException' when asked to get a log that does not exist" -Pending:($True) { { Get-EventLog -LogName MissingTestLog -ErrorAction Stop } | Should -Throw -ErrorId "System.InvalidOperationException,Microsoft.PowerShell.Commands.GetEventLogCommand" } }
combined_dataset/train/non-malicious/2330.ps1
2330.ps1
[CmdletBinding()] [OutputType([Amazon.Route53.Model.ChangeInfo])] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Name, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$ZoneName, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$AliasName, [Parameter()] [ValidateNotNullOrEmpty()] [int]$TTL = 300, [Parameter()] [ValidateNotNullOrEmpty()] [string]$AWSRegion = 'us-west-1' ) begin { try { if ((Get-AWSCredentials -ListStoredCredentials) -notcontains 'default') { throw 'No default AWS credentials set. To set use the "Set-AWSCredentials -AccessKey <YourKey> -SecretKey <YourKey> -StoreAs default" command' } Initialize-AWSDefaults -ProfileName default -Region $AWSRegion } catch { $PSCmdlet.ThrowTerminatingError($_) } } process { try { $hostedZones = Get-R53HostedZones if ($hostedZones.Name.TrimEnd('.') -notcontains $ZoneName) { throw "Could not find any hosted DNS zones matching the domain name [$($ZoneName)]" } $hostedZone = $hostedZones | where { $_.Name -eq "$ZoneName." } $recordSet = New-Object -TypeName Amazon.Route53.Model.ResourceRecordSet $recordSet.Name = "$Name.$ZoneName." $recordSet.Type = 'CNAME' $recordSet.TTL = $TTL $recordSet.ResourceRecords.Add((New-Object Amazon.Route53.Model.ResourceRecord($AliasName))) $action = New-Object -TypeName Amazon.Route53.Model.Change $action.Action = 'CREATE' $action.ResourceRecordSet = $recordSet Edit-R53ResourceRecordSet -HostedZoneId $hostedZone.ID -ChangeBatch_Change $action } catch { $PSCmdlet.ThrowTerminatingError($_) } }
combined_dataset/train/non-malicious/4163.ps1
4163.ps1
function Get-MSIInformation { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()] [System.IO.FileInfo]$MSI, [ValidateSet('ProductCode', 'ProductVersion', 'ProductName', 'Manufacturer', 'ProductLanguage', 'FullVersion')] [string]$Property ) $WindowsInstaller = New-Object -ComObject WindowsInstaller.Installer $MSIDatabase = $WindowsInstaller.GetType().InvokeMember("OpenDatabase", "InvokeMethod", $null, $WindowsInstaller, @($MSI.FullName, 0)) $Query = "SELECT Value FROM Property WHERE Property = '$($Property)'" $View = $MSIDatabase.GetType().InvokeMember("OpenView", "InvokeMethod", $null, $MSIDatabase, ($Query)) $View.GetType().InvokeMember("Execute", "InvokeMethod", $null, $View, $null) $Record = $View.GetType().InvokeMember("Fetch", "InvokeMethod", $null, $View, $null) $Value = $Record.GetType().InvokeMember("StringData", "GetProperty", $null, $Record, 1) $MSIDatabase.GetType().InvokeMember("Commit", "InvokeMethod", $null, $MSIDatabase, $null) $View.GetType().InvokeMember("Close", "InvokeMethod", $null, $View, $null) $MSIDatabase = $null $View = $null return $Value } function Get-RelativePath { [CmdletBinding()] [OutputType([string])] param () $Path = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\" Return $Path } function Install-MSI { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()] [string]$MSI, [ValidateNotNullOrEmpty()] [string]$Switches ) [string]$DisplayName = Get-MSIInformation -MSI $MSI -Property 'ProductName' $Executable = $Env:windir + "\system32\msiexec.exe" $Parameters = "/i" + [char]32 + [char]34 + $MSI + [char]34 + [char]32 + $Switches Write-Host "Install"$DisplayName.Trim()"....." -NoNewline $ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -Wait -Passthru).ExitCode If (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed with error code "$ErrCode -ForegroundColor Red Exit $ErrCode } } function Stop-Processes { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()] [String]$ProcessName ) $Processes = Get-Process $ProcessName -ErrorAction SilentlyContinue If ($Processes -ne $null) { Do { foreach ($Process in $Processes) { If ($Process.Product -ne $null) { Write-Host "Killing"(($Process.Product).ToString()).Trim()"Process ID"(($Process.Id).ToString()).Trim()"....." -NoNewline Stop-Process -Id $Process.Id -Force -ErrorAction SilentlyContinue Start-Sleep -Milliseconds 250 $Process = Get-Process -Id $Process.Id -ErrorAction SilentlyContinue If ($Process -eq $null) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red } } } $Process = Get-Process $ProcessName -ErrorAction SilentlyContinue } While ($Process -ne $null) } } function Uninstall-MSIByName { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()] [String]$ApplicationName, [ValidateNotNullOrEmpty()] [String]$Switches ) $Executable = $Env:windir + "\system32\msiexec.exe" Do { $Uninstall = Get-ChildItem REGISTRY::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall -Recurse -ErrorAction SilentlyContinue -Force $Uninstall += Get-ChildItem REGISTRY::HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall -Recurse -ErrorAction SilentlyContinue $Key = $uninstall | foreach-object { Get-ItemProperty REGISTRY::$_ } | where-object { $_.DisplayName -like "*$ApplicationName*" } If ($Key -ne $null) { Write-Host "Uninstall"$Key[0].DisplayName"....." -NoNewline $Parameters = "/x " + $Key[0].PSChildName + [char]32 + $Switches $ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -Wait -Passthru).ExitCode If (($ErrCode -eq 0) -or ($ErrCode -eq 3010) -or ($ErrCode -eq 1605)) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed with error code "$ErrCode -ForegroundColor Red } } } While ($Key -ne $null) } $RelativePath = Get-RelativePath Stop-Processes -ProcessName 'DesktopApp' Stop-Processes -ProcessName 'winword' Stop-Processes -ProcessName 'excel' Stop-Processes -ProcessName 'outlook' Stop-Processes -ProcessName 'powerpnt' Uninstall-MSIByName -ApplicationName 'OutlookAddInInstaller' -Switches '/qb- /norestart' Uninstall-MSIByName -ApplicationName 'PingDesktopApp' -Switches '/qb- /norestart'
combined_dataset/train/non-malicious/sample_33_60.ps1
sample_33_60.ps1
@{ # Script module or binary module file associated with this manifest ModuleToProcess = 'nuget.psm1' # Version number of this module. ModuleVersion = '2.0.0.0' # ID used to uniquely identify this module GUID = '76e6f9c4-7045-44c0-a557-17fab0835c12' # Author of this module Author = 'NuGet Team' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) 2010 Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'NuGet PowerShell module used for the Package Manager Console' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '2.0' # Name of the Windows PowerShell host required by this module PowerShellHostName = 'Package Manager Host' # Minimum version of the Windows PowerShell host required by this module PowerShellHostVersion = '1.2' # Minimum version of the .NET Framework required by this module DotNetFrameworkVersion = '4.0' # Minimum version of the common language runtime (CLR) required by this module CLRVersion = '' # Processor architecture (None, X86, Amd64, IA64) required by this module ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module ScriptsToProcess = @('profile.ps1') # Type files (.ps1xml) to be loaded when importing this module TypesToProcess = @('NuGet.Types.ps1xml') # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = @('NuGet.Format.ps1xml') # Modules to import as nested modules of the module specified in ModuleToProcess NestedModules = @('NuGet.PackageManagement.PowerShellCmdlets, Version=6.10.0.52, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a') # Functions to export from this module FunctionsToExport = @('Register-TabExpansion') # Cmdlets to export from this module CmdletsToExport = @( 'Install-Package', 'Uninstall-Package', 'Update-Package', 'Get-Package', 'Get-Project', 'Sync-Package', 'Find-Package' 'Add-BindingRedirect') # Variables to export from this module VariablesToExport = '' # Aliases to export from this module AliasesToExport = '' # List of all modules packaged with this module ModuleList = @() # List of all files packaged with this module FileList = @() # Private data to pass to the module specified in ModuleToProcess PrivateData = '' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDe601wW0pLMv1L # j1PyS71RCKMq1P5Hl7/HDg1B1fz8CKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIOY+apiplZWEy2QUt/oERFU # NhxAxHA1PfkGwoJ6J8UzMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAAC/isi6JkUgBAZht0/lo6cvLaKRvCuK6kX0GKmSTXrT/5Iw1TKbdD2Mn # MSlv46VDKC5QC4HrBsy6dLv+/51NIeF2FpfIJCm2KW+hrlnjseGHn65bbbHXYkNE # n//NfsMsVRMH1B70DLZx0YhBdlkk3i16A7JlHBuOVwiv/dlNDzUnp0Yi1tUukJiO # YGYoByMxMe0D3xn2TLmO4TW3Mu0Yu/GExhIXnD8BNiRxSZvWS5Ais9kVxXZRIMty # YulnoYoZ7tRB7BHDLumf6qjZqIaFwygp2bkBIbPdeoTsRuyerx7dxDZCeUOpblcS # qNwmIhnIJPj6i68ooLG0YGSKY9R8y6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAVcXRdIWOUzniWpoPyj2MdcUtjaTbKdBtQOlHYwsycMgIGZdXk6k5n # GBMyMDI0MDIyODA5NTUxMS4xOThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOmI9BUwIhgPMjAyNDAyMjgwNzUxNDlaGA8yMDI0MDIyOTA3NTE0OVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6Yj0FQIBADAHAgEAAgIC+DAHAgEAAgISLjAKAgUA # 6YpFlQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBABOCmeAqoEKdNKI41vTX # a0lN61HKU31+KX0c391U4lzzzyYaIE9L06uGE3FDLHxxdriqc0iv+c2O31ZAwZZW # GucpybBmDv6k08iPeTXBvvLo+ZVHoZ8EkzEFP4sriHtpTmF+jTrqNh0sRVQmNWMd # 530veimk0UpZ2Z8biBakF8VXMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgExscnyTF1X9N/w4u7MstEFvg9L9Fx4cuU1AFiOwFdbcwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIK9QKIMUFFSNGrXA2A4F6lT5ogwFOYv0X5EWcYvHoLzt # MA0GCSqGSIb3DQEBCwUABIICAAMQCy5C88WwbYbjKIj1NtUCHJoyJbjheEZQQbpy # 02kQRaibHZ5Nxxb50D+1eo+deF0xmSp1J2DNOOpeFLqJdE7W+BaSw0Sg1rhGYwth # 2/7b7dbPuTUXhV27OWqFSyA3RqCgHpaeAPXXlqg/ES5WJJt4S1+Q9LFSucND3hF5 # BS0B+CtPrLAYkbBDe+Jui8kFPs1iZWmuHMG6CqccpAvEpHSplNEXur67J/13uQQ7 # 9zx/XMyB569Ifm/8hPEikEXNIayMe84mXHliVBcSeVKcchc7tHgSAt89JW408pvC # 8Ny7bzQj1THBvj7TnO4wGqqC+uCraawtMy141P9bkbkSKt97ev96j9F1gAEvdcrz # lAcC3WdF4KUh8SPd4hFde1tNYd9xdfad2o1O7shhnpH86Hm5J5b1FG6zYYhB5O/J # h/Rlk7KAO4J52BLlFf5jUTVPRpNEtI1TI2BW7APMVc2NUUvykDFEhZES6yDP+/NZ # jR36RNHrwEwmdZsVq5dtiRy2GlI0nucxXUwDKbdfEXspZM1hD7njQ5qKrKnbhWxv # Kw5uWBH7k6VxQhE5qAW7LXkCj/kXD275ArKpeAtQyVJn/E1ErutZz1HtFRmV5DiH # YmTR4MFFasgOMkd1M1gAij7XXnrkeSnSfFh8QBs9Ch6VsPS8UGOdT5TMTvj25zrl # bDc8 # SIG # End signature block
combined_dataset/train/non-malicious/sample_28_45.ps1
sample_28_45.ps1
# Get the version of the Torizon IDE Extension from package.json $env:TEST_EXTENSION_VERSION = ((Get-Content "package.json" -Raw) | ConvertFrom-Json).version $env:TEST_VSCODE_CLEANUP = $true # Start the tests from a clean environment, unless explictly setting to false # the env variable if ($env:TEST_VSCODE_CLEANUP -Eq $true) { # cleanup Write-Output "Clearing dotvscode and ~/.apollox" # remove dotvscode if (Test-Path "dotvscode") { Remove-Item -Recurse -Force "dotvscode" } # remove .apollox if (Test-Path -Path "$env:HOME/.apollox") { Remove-Item -Recurse -Force "$env:HOME/.apollox" } } if (!(Test-Path "dotvscode")) { # get test-resources # If vscode-extension-tester hasn't been released for the latest VSCode: # https://github.com/redhat-developer/vscode-extension-tester # use the -c <vscode version> parameter, ex: npx extest get-vscode -c 1.86.2 npx extest get-vscode -s "dotvscode" npx extest get-chromedriver -s "dotvscode" } # clean file stream Write-Host "" > "dotvscode/currentTestTerminalOutput.log" # remove out and recompiled it, this is useful for local tests if (Test-Path .\out) { Remove-Item -Recurse -Force .\out } # compile and pack # apollox npm --prefix ../apollox run pack $APOLLOX_FILE = ((Get-Content "package.json" -Raw) | ConvertFrom-Json).dependencies.apollox $APOLLOX_FILE = $APOLLOX_FILE.replace('file:','') Copy-Item $APOLLOX_FILE . # apollox-vscode npm run pack # install npx extest install-vsix -e "dotvscode/extensions" -f ./apollox-vscode-linux-x64-$env:TEST_EXTENSION_VERSION.vsix -s "dotvscode"
combined_dataset/train/non-malicious/sample_32_76.ps1
sample_32_76.ps1
# # Module manifest for module 'Microsoft.SME.EventViewer' # @{ # Script module or binary module file associated with this manifest. RootModule = 'Microsoft.SME.EventViewer.psm1' # Version number of this module. ModuleVersion = '4.11.1' # Supported PSEditions # CompatiblePSEditions = @() # ID used to uniquely identify this module GUID = 'DBB7F730-24A4-4C9B-98D7-3CBBC9E8FA74' # Author of this module Author = 'SME' # Company or vendor of this module CompanyName = 'Microsoft' # Copyright statement for this module Copyright = '(c) 2018 Microsoft. All rights reserved.' # Description of the functionality provided by this module # Description = '' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.0' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @( 'Clear-WACEVEventLogChannel', 'Clear-WACEVEventLogChannelAfterExport', 'Export-WACEVEventLogChannel', 'Get-WACEVCimEventLogRecords', 'Get-WACEVClusterEvents', 'Get-WACEVEventLogDisplayName', 'Get-WACEVEventLogFilteredCount', 'Get-WACEVEventLogRecords', 'Get-WACEVEventLogSummary', 'Set-WACEVEventLogChannelStatus', 'Get-WACEVCimWin32LogicalDisk', 'Get-WACEVCimWin32NetworkAdapter', 'Get-WACEVCimWin32PhysicalMemory', 'Get-WACEVCimWin32Processor', 'Get-WACEVClusterInventory', 'Get-WACEVClusterNodes', 'Get-WACEVDecryptedDataFromNode', 'Get-WACEVEncryptionJWKOnNode', 'Get-WACEVServerInventory' ) # Function attributes: {"localScripts":["Clear-WACEVEventLogChannel","Clear-WACEVEventLogChannelAfterExport","Export-WACEVEventLogChannel","Get-WACEVCimEventLogRecords","Get-WACEVClusterEvents","Get-WACEVEventLogDisplayName","Get-WACEVEventLogFilteredCount","Get-WACEVEventLogRecords","Get-WACEVEventLogSummary","Set-WACEVEventLogChannelStatus"],"externalScripts":["Get-WACEVCimWin32LogicalDisk","Get-WACEVCimWin32NetworkAdapter","Get-WACEVCimWin32PhysicalMemory","Get-WACEVCimWin32Processor","Get-WACEVClusterInventory","Get-WACEVClusterNodes","Get-WACEVDecryptedDataFromNode","Get-WACEVEncryptionJWKOnNode","Get-WACEVServerInventory"]} # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAVx1lva/fsjPnt # FOLcgJfYcpyCnmWhLLLTj1FpcWY5yaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINFYJ9dL2GTUeVdQjav9qW79 # 96hOlcH6+gtsQV5RROe8MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAzHS8yQJd6OXtf8j68zDFoN6Ah3FidDr4NIOQrWjI+pqzh1qZhu9vuHNY # AMSpieWcdeXO+2AyPsDLDXrR40EAYltkGPklzERhP1jDM5x1q5rl9BeKxLirRegU # IjXkfw116oioTOx0JQ/NpAJ7e84kegvdijGSuSNTb+uhXSMFcWG9Nhi2uXeE3TZe # XG6bjEVXK8CMpmv/d8TQXk+DShc8Lz6950eSbQ7dx7WjccNKN8Kc5ZDHU1vTW6Yo # SjE40ffPg69wExO69891zurJVkmHMaSRyGrd+7YCkLRBNeB0CQBwnj7R5y2jxwl6 # 9RapVKXRFKsdxjqz36MR2/9gzNhAlKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCEK/aCCoWRLRQ8xgrAJBz4vn7dJs5X/xyMUFi6LSs3uQIGZc4jGFaC # GBMyMDI0MDIyMDE4NTcwMS40NDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4 # EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob # FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs # 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC # z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I # U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU # qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR # BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO # oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ # sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX # OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh # twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG # Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM # Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe # ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV # xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI # bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM # fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF # C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO # Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x # 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT # 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu # Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC # KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X84uTAiGA8yMDI0MDIyMDE0NDIw # MVoYDzIwMjQwMjIxMTQ0MjAxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpfzi5 # AgEAMAcCAQACAg+2MAcCAQACAhJRMAoCBQDpgIo5AgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAJXHC8jMI5gtOb71pqJRDm7fV2S0k14ybnwYjxVYfr75okw9 # BApzdC/I3gzZVZHnNH5lAG7Z3kmUWzREh4fsCov8L99+kCr8VCQTKRlXD7NQIyQ8 # Ua1rSY+SWh4q2jn/sOpCq4WV/ysj6p5yCgRbZI//mkmGhtduhy3TVD+qMYj0YcwB # QkWKqfaqKriJSqLTR7DGDdO68yHVG1mqLmffRdtPTVtoCOOGHS0tzbg0rKKxZ+wY # bYGJDM9hMN5DbYI98+XRekTNOLEC64mFxgtw4UFCWiTCB2A75nYOcEk29Bu2bolt # uQjdwDAWxASIJlmsKUjCpfPxFA//z+eX4EAUhaQxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB8DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCDihT2TFIuqstluMbCv3hIOcRF2Ghy3TwlwoHKQf8fl6TCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74QFAiS # 6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQg46TLjFP2nVD2l7R1h9LKEf6jvmAv # XyY/gaMoGWGZlqEwDQYJKoZIhvcNAQELBQAEggIAU4kSbp7OCybjEzVFrlQzX0LM # Lpt1N/52d0/rK5F70sCCCRTDJf7PP6KRNvqbSokovKHwSSD4Lo79sxKXI+pxk4tg # Xg89PaxmSdfAOfTCq2gFvEVjKk33j+VPSBrM8TMzYidflSmrrF4f8+Uv0s8YTZf8 # BQypn6trKJcw8xufQLybbJGnk/LU/iDl5ujHckLwkoiJxNLKEKEaGux6YxbMyFtX # eDVpu/ZM0rbO6VcQV8K6brdzj3b0+/PR+msXwWcdIpOG4Q3a0rtwSGL4p9ISc8I4 # BwMc2TZLjbpD9nlWijhQypm5rc93vkz8+ik26/JIS59AIJAFLGoh9pPQznqrl1Ml # WNcVA00pSSB/Y5qPcjZV6jcVBjgdNBKHed/Sb7/1Mtzntcj3l+WjjGh77135M0wH # fImQzQO1bsHMmCho1xLXchepLVRgUU/eTc7yRj0cioJExpPzOzT8sFh8YSAWHazj # Ab5r/xUJua2kUasMtOZoL2PT7dEzPOa+FxC/+YaQXzNObgbC3OejMIAx6NPyxQPJ # 7j5Aa8HiVw4bv8XGOKT3A2X1Sw1LMujwkfxDC3ZYal1Y24SCmRYiSsqPAV07sYYM # hLIvSvxyABp0lLpiZdGZs6phh1Zg/4895BcukUPfkQ2Gi1ypvBvCp48cg2t7R+Dz # VF5dMvCQnz9MvEWbU8o= # SIG # End signature block
combined_dataset/train/non-malicious/4084.ps1
4084.ps1
Clear-Host $Global:MountPath $Global:RelativePath $Global:WimFile $Global:UpdatesPath Function GetRelativePath{ $Global:RelativePath=(split-path $SCRIPT:MyInvocation.MyCommand.Path -parent)+"\" Write-Host $Global:RelativePath } Function GetWimFile{ $FileName = Get-ChildItem $Global:RelativePath | Where-Object {($_.Name -like "*.wim")} $Global:WimFile = $Global:RelativePath+$FileName Write-Host $Global:WimFile } Function MountWIM{ $Global:MountPath = $Global:RelativePath+"Mount\" If ((Test-Path $Global:MountPath) -ne $true){ New-Item -ItemType directory -Path $Global:RelativePath"Mount" } Write-Host $Global:MountPath $Arguments = "dism.exe /mount-wim /wimfile:"+$Global:WimFile+[char]32+"/index:1 /mountdir:"+$Global:MountPath Write-Host $Arguments Invoke-Expression -Command $Arguments } Function UnmountWIM{ $Arguments = "dism.exe /unmount-wim /mountdir:"+$Global:MountPath+[char]32+"/commit" Write-Host $Arguments Invoke-Expression -Command $Arguments } Function CleanupWIM{ $Arguments = "dism.exe /cleanup-wim" Write-Host $Arguments Invoke-Expression -Command $Arguments } Function GlobalMemoryCleanup{ Clear-Variable -Name MountPath -Scope Global -Force Clear-Variable -Name WimFile -Scope Global -Force Clear-Variable -Name UpdatesPath -Scope Global -Force Clear-Variable -Name RelativePath -Scope Global -Force Remove-Variable -Name MountPath -Scope Global -Force Remove-Variable -Name WimFile -Scope Global -Force Remove-Variable -Name UpdatesPath -Scope Global -Force Remove-Variable -Name RelativePath -Scope Global -Force } GetRelativePath GetWimFile MountWIM $Global:UpdatesPath = $Global:RelativePath+"*.msu" $UpdatesArray = Get-Item $Global:UpdatesPath ForEach ($Updates in $UpdatesArray) { $Arguments = "dism.exe /image:"+$Global:MountPath+[char]32+"/Add-Package /PackagePath:"+$Updates Write-Host $Arguments Invoke-Expression -Command $Arguments Start-Sleep -Seconds 10 } UnmountWIM CleanupWIM Clear-Variable -Name Arguments -Scope Local -Force Clear-Variable -Name Updates -Scope Local -Force Clear-Variable -Name UpdatesArray -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force Remove-Variable -Name Updates -Scope Local -Force Remove-Variable -Name UpdatesArray -Scope Local -Force GlobalMemoryCleanup
combined_dataset/train/non-malicious/sample_1_71.ps1
sample_1_71.ps1
ConvertFrom-StringData @' id_hypervnet=Hyper-V Networking Information id_hypervnetobtaining=Obtaining advanced networking information '@ # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCALHV3gakgtq6WM # XHYCihyz4CbDpFldx0SjKNGUnCSDk6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKs5EqgVMi0B/Z81T4fcAFU7 # /FHsqLcOaFwCvEGAzrQ3MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEASRs1hLB0no6iTxTtLGQEyPR2fmrXrK6o01SA5xZat+nftAAqbHPN/woj # BmD30Lk7PnmJ+vJ/VCvJCamUrsv5znyN028XNVUreTMHV717CYor8qHJBVQVxuuO # eyqAd/ZeMoqL670FDVSx4rq0V+6zsFBid3SRuIJ0NWWfr4Vq4yfpFlL09NnXOdtL # 0D/C49E50OaT5vzw8I7lQdzm5VR2ZT68rhG47cVDRCv9i32JwmRA+jJ74dMyLOAm # d51wsowaoRHmn4FMr9iYjne1YUG5HEHVq5gF4KTEZ9HdtStkVPM900CZuFu1FGN+ # /FFsa5kkuVeQpHd0KPTzDoGLT6kNwqGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA8X9SjJG+htZG4m0h4kObcgPKu6H7I8pyV4uGgNFhrQwIGZusyQ1df # GBMyMDI0MTAyODExNDA0MS44NzVaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB/XP5aFrNDGHtAAEAAAH9MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExNloXDTI1MTAyMjE4MzExNlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJEMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAoWWs+D+Ou4JjYnRHRedu # 0MTFYzNJEVPnILzc02R3qbnujvhZgkhp+p/lymYLzkQyG2zpxYceTjIF7HiQWbt6 # FW3ARkBrthJUz05ZnKpcF31lpUEb8gUXiD2xIpo8YM+SD0S+hTP1TCA/we38yZ3B # EtmZtcVnaLRp/Avsqg+5KI0Kw6TDJpKwTLl0VW0/23sKikeWDSnHQeTprO0zIm/b # tagSYm3V/8zXlfxy7s/EVFdSglHGsUq8EZupUO8XbHzz7tURyiD3kOxNnw5ox1eZ # X/c/XmW4H6b4yNmZF0wTZuw37yA1PJKOySSrXrWEh+H6++Wb6+1ltMCPoMJHUtPP # 3Cn0CNcNvrPyJtDacqjnITrLzrsHdOLqjsH229Zkvndk0IqxBDZgMoY+Ef7ffFRP # 2pPkrF1F9IcBkYz8hL+QjX+u4y4Uqq4UtT7VRnsqvR/x/+QLE0pcSEh/XE1w1fcp # 6Jmq8RnHEXikycMLN/a/KYxpSP3FfFbLZuf+qIryFL0gEDytapGn1ONjVkiKpVP2 # uqVIYj4ViCjy5pLUceMeqiKgYqhpmUHCE2WssLLhdQBHdpl28+k+ZY6m4dPFnEoG # cJHuMcIZnw4cOwixojROr+Nq71cJj7Q4L0XwPvuTHQt0oH7RKMQgmsy7CVD7v55d # OhdHXdYsyO69dAdK+nWlyYcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTpDMXA4ZW8 # +yL2+3vA6RmU7oEKpDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAY9hYX+T5AmCr # YGaH96TdR5T52/PNOG7ySYeopv4flnDWQLhBlravAg+pjlNv5XSXZrKGv8e4s5dJ # 5WdhfC9ywFQq4TmXnUevPXtlubZk+02BXK6/23hM0TSKs2KlhYiqzbRe8QbMfKXE # DtvMoHSZT7r+wI2IgjYQwka+3P9VXgERwu46/czz8IR/Zq+vO5523Jld6ssVuzs9 # uwIrJhfcYBj50mXWRBcMhzajLjWDgcih0DuykPcBpoTLlOL8LpXooqnr+QLYE4Bp # Uep3JySMYfPz2hfOL3g02WEfsOxp8ANbcdiqM31dm3vSheEkmjHA2zuM+Tgn4j5n # +Any7IODYQkIrNVhLdML09eu1dIPhp24lFtnWTYNaFTOfMqFa3Ab8KDKicmp0Ath # RNZVg0BPAL58+B0UcoBGKzS9jscwOTu1JmNlisOKkVUVkSJ5Fo/ctfDSPdCTVaIX # XF7l40k1cM/X2O0JdAS97T78lYjtw/PybuzX5shxBh/RqTPvCyAhIxBVKfN/hfs4 # CIoFaqWJ0r/8SB1CGsyyIcPfEgMo8ceq1w5Zo0JfnyFi6Guo+z3LPFl/exQaRubE # rsAUTfyBY5/5liyvjAgyDYnEB8vHO7c7Fg2tGd5hGgYs+AOoWx24+XcyxpUkAajD # hky9Dl+8JZTjts6BcT9sYTmOodk/SgIwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAoj0WtVVQUNSKoqtrjinRAsBUdoOggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJwV8wIhgPMjAyNDEwMjgwNzUzMDNaGA8yMDI0MTAyOTA3NTMwM1owdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6snBXwIBADAHAgEAAgIJ5zAHAgEAAgISQjAK # AgUA6ssS3wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQA/CC/LZ2oFgj4y # M+DFyNVKcBzdk7bpwAmueOznqReWHoXmwUIc/XnbhfCWF4kzzIktKGUnhyd/L3j7 # RHbVvGeGF+fZiYJZZNmG7ACSfV5XzRFpVnXhG1Eq8trnzQMegLEIZHFbBaiR6h9j # /oOV3GL1tWefgGg4PLjA2CLf/qTJq8v1GGX/8Jg7c9fFMtqdncqg8a2hOSPYghty # l1zQ+Acf393GEF9RdMESmpaRxOgTKfbI2UbSjoWhj0unmdz7ZrxHx5mL0kEArzE1 # Q+EWLfNOToT2f5td5d8T/A/LephISU0PquyBJaI3KX6lfDhbaf2LYZ2H/D5el6NP # 4izM97TyMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH9c/loWs0MYe0AAQAAAf0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg+PhRNtziNQ4F # guqbDSw4/MmRzalVa/870cmVBA0IF1kwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCCAKEgNyUowvIfx/eDfYSupHkeF1p6GFwjKBs8lRB4NRzCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/XP5aFrNDGHtAAEAAAH9 # MCIEILkYvpuRiODssJyAPH65EnrV3KtBv8aYFkft91FYt/GwMA0GCSqGSIb3DQEB # CwUABIICAAVjIf0WSfuYVEGRh6K6PR+0Wnea2u77KS2f4ZKdZPsAzpS36dDcwugJ # Am2pdYpRkeq7MIY4XmfENf5pHjGI3RFxeYoVrDYCucwLMrjpCz2IC5g0sNUr6vzC # EW89TdQxba3tYDvrG8iE1pSwKiUTjIqRZAQekYXuwXuDGvudvMLq98CCQmpxQYgA # IyCI4selVcClmxmkdsWdB6X73nQKlBPqPiT7+wKQDevsQXA3jgmdxjh7afCgMNc8 # NEwaFQoG2OgzV4fFvOVL5r2iimqOQL9ZWTrbFWIpo+XtpTH+6Xl6sk7nMVDj92Fh # wiXyUjDiwm7nmyUcRadokdonX2PU99f1ZMcellAI76OdVPErwUOAkHgu8xQuj8zq # TiSgW3L09VA80l+E2r4vAdEExUfZFwQ7tj87wGzDDPwRzdlEHN0qZ43IIzAL34FV # hOhtcoQWDxEnBjfNPVYOc2DrlNZebJCCxk/BjCSnJRwdCmBFjhYor+3DeEM+x7ks # 2uxZzkoaUAtr4kXrSEQs7IpQJ1ABPFThog2QvR78JPMcvwfgrBqOu7xIO/xAR5Y8 # uShK7V2kBqFLP3joPNwR+7UJ5B9Rf5B2qZs26JZK0Yarwnrmmiq90qat//Un89Gg # nyU+vE8O7VgiqSmkyLrXY4UMQ5iI87gIrNmw9tSW+kMuy1YK9ZRW # SIG # End signature block
combined_dataset/train/non-malicious/465.ps1
465.ps1
$mappings = @{ "deserialized.microsoft.activedirectory.management.addomaincontroller" = @("HostName", "Name") "microsoft.activedirectory.management.addomaincontroller" = @("HostName", "Name") "microsoft.sqlserver.management.smo.server" = @("NetName", "DomainInstanceName") "deserialized.microsoft.sqlserver.management.smo.server" = @("NetName", "DomainInstanceName") "microsoft.sqlserver.management.smo.linkedserver" = @("Name") "deserialized.microsoft.sqlserver.management.smo.linkedserver" = @("Name") "microsoft.activedirectory.management.adcomputer" = @("DNSHostName", "Name") "deserialized.microsoft.activedirectory.management.adcomputer" = @("DNSHostName", "Name") "Microsoft.DnsClient.Commands.DnsRecord_A" = @("Name", "IPAddress") "Deserialized.Microsoft.DnsClient.Commands.DnsRecord_A" = @("Name", "IPAddress") "Microsoft.DnsClient.Commands.DnsRecord_AAAA" = @("Name", "IPAddress") "Deserialized.Microsoft.DnsClient.Commands.DnsRecord_AAAA" = @("Name", "IPAddress") } foreach ($key in $mappings.Keys) { Register-PSFParameterClassMapping -ParameterClass 'Computer' -TypeName $key -Properties $mappings[$key] }
combined_dataset/train/non-malicious/sample_32_19.ps1
sample_32_19.ps1
--- - name: Fault set Operations hosts: localhost connection: local gather_facts: false vars: hostname: 'x.x.x.x' username: 'admin' password: 'Password' validate_certs: false host_port: 443 fault_set_name: "sample_fault_set_name_1" protection_domain_name: "Ansible-PD1" tasks: - name: Create fault set dellemc.powerflex.fault_set: hostname: "{{ hostname }}" username: "{{ username }}" password: "{{ password }}" validate_certs: "{{ validate_certs }}" port: "{{ host_port }}" fault_set_name: "{{ fault_set_name }}" protection_domain_name: "{{ protection_domain_name }}" - name: Get fault set details using name and protection domain register: result dellemc.powerflex.fault_set: hostname: "{{ hostname }}" username: "{{ username }}" password: "{{ password }}" validate_certs: "{{ validate_certs }}" port: "{{ host_port }}" fault_set_name: "{{ fault_set_name }}" protection_domain_name: "{{ protection_domain_name }}" - name: Get fault set details using ID dellemc.powerflex.fault_set: hostname: "{{ hostname }}" username: "{{ username }}" password: "{{ password }}" validate_certs: "{{ validate_certs }}" port: "{{ host_port }}" fault_set_id: "{{ result.fault_set_details.id }}" state: "present" - name: Rename fault set details using ID dellemc.powerflex.fault_set: hostname: "{{ hostname }}" username: "{{ username }}" password: "{{ password }}" validate_certs: "{{ validate_certs }}" port: "{{ host_port }}" fault_set_id: "{{ result.fault_set_details.id }}" fault_set_new_name: "fault_set_new_name" state: "present" - name: Delete fault set dellemc.powerflex.fault_set: hostname: "{{ hostname }}" username: "{{ username }}" password: "{{ password }}" validate_certs: "{{ validate_certs }}" port: "{{ host_port }}" fault_set_name: "fault_set_new_name" protection_domain_name: "{{ protection_domain_name }}" state: "absent"
combined_dataset/train/non-malicious/sample_28_23.ps1
sample_28_23.ps1
# # Module manifest for module 'OCI.PSModules.Usage' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Usage.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '9ad21498-2007-42f7-9492-bacc9b5b532f' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Usage Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Usage.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIUsageLimitsList', 'Get-OCIUsageProductsList', 'Get-OCIUsageRedeemableUsersList', 'Get-OCIUsageRedemptionsList', 'Get-OCIUsageResourceQuotaList', 'Get-OCIUsageResourcesList', 'Get-OCIUsageRewardsList', 'New-OCIUsageRedeemableUser', 'Remove-OCIUsageRedeemableUser' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Usage' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_46_5.ps1
sample_46_5.ps1
# # Module manifest for module 'OCI.PSModules.Identity' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Identity.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '79636fb4-f5fc-4bf8-b817-bcca97c97ff4' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Identity Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Identity.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIIdentityTagDefaultLock', 'Add-OCIIdentityTagNamespaceLock', 'Add-OCIIdentityUserToGroup', 'Enable-OCIIdentityDomain', 'Enable-OCIIdentityMfaTotpDevice', 'Enable-OCIIdentityReplicationToRegion', 'Get-OCIIdentityAllowedDomainLicenseTypesList', 'Get-OCIIdentityApiKeysList', 'Get-OCIIdentityAuthenticationPolicy', 'Get-OCIIdentityAuthTokensList', 'Get-OCIIdentityAvailabilityDomainsList', 'Get-OCIIdentityBulkActionResourceTypesList', 'Get-OCIIdentityBulkEditTagsResourceTypesList', 'Get-OCIIdentityCompartment', 'Get-OCIIdentityCompartmentsList', 'Get-OCIIdentityCostTrackingTagsList', 'Get-OCIIdentityCustomerSecretKeysList', 'Get-OCIIdentityDbCredentialsList', 'Get-OCIIdentityDomain', 'Get-OCIIdentityDomainsList', 'Get-OCIIdentityDynamicGroup', 'Get-OCIIdentityDynamicGroupsList', 'Get-OCIIdentityFaultDomainsList', 'Get-OCIIdentityGroup', 'Get-OCIIdentityGroupsList', 'Get-OCIIdentityIamWorkRequest', 'Get-OCIIdentityIamWorkRequestErrorsList', 'Get-OCIIdentityIamWorkRequestLogsList', 'Get-OCIIdentityIamWorkRequestsList', 'Get-OCIIdentityIdpGroupMapping', 'Get-OCIIdentityIdpGroupMappingsList', 'Get-OCIIdentityMfaTotpDevice', 'Get-OCIIdentityMfaTotpDevicesList', 'Get-OCIIdentityNetworkSource', 'Get-OCIIdentityNetworkSourcesList', 'Get-OCIIdentityOAuthClientCredentialsList', 'Get-OCIIdentityPoliciesList', 'Get-OCIIdentityPolicy', 'Get-OCIIdentityProvider', 'Get-OCIIdentityProviderGroupsList', 'Get-OCIIdentityProvidersList', 'Get-OCIIdentityRegionsList', 'Get-OCIIdentityRegionSubscriptionsList', 'Get-OCIIdentitySmtpCredentialsList', 'Get-OCIIdentityStandardTagNamespacesList', 'Get-OCIIdentityStandardTagTemplate', 'Get-OCIIdentitySwiftPasswordsList', 'Get-OCIIdentityTag', 'Get-OCIIdentityTagDefault', 'Get-OCIIdentityTagDefaultsList', 'Get-OCIIdentityTaggingWorkRequest', 'Get-OCIIdentityTaggingWorkRequestErrorsList', 'Get-OCIIdentityTaggingWorkRequestLogsList', 'Get-OCIIdentityTaggingWorkRequestsList', 'Get-OCIIdentityTagNamespace', 'Get-OCIIdentityTagNamespacesList', 'Get-OCIIdentityTagsList', 'Get-OCIIdentityTenancy', 'Get-OCIIdentityUser', 'Get-OCIIdentityUserGroupMembership', 'Get-OCIIdentityUserGroupMembershipsList', 'Get-OCIIdentityUsersList', 'Get-OCIIdentityUserUIPasswordInformation', 'Get-OCIIdentityWorkRequest', 'Get-OCIIdentityWorkRequestsList', 'Import-OCIIdentityStandardTags', 'Invoke-OCIIdentityAssembleEffectiveTagSet', 'Invoke-OCIIdentityBulkDeleteResources', 'Invoke-OCIIdentityBulkDeleteTags', 'Invoke-OCIIdentityBulkEditTags', 'Invoke-OCIIdentityBulkMoveResources', 'Invoke-OCIIdentityCascadeDeleteTagNamespace', 'Invoke-OCIIdentityDeactivateDomain', 'Move-OCIIdentityCompartment', 'Move-OCIIdentityDomainCompartment', 'Move-OCIIdentityDomainLicenseType', 'Move-OCIIdentityTagNamespaceCompartment', 'New-OCIIdentityAuthToken', 'New-OCIIdentityCompartment', 'New-OCIIdentityCustomerSecretKey', 'New-OCIIdentityDbCredential', 'New-OCIIdentityDomain', 'New-OCIIdentityDynamicGroup', 'New-OCIIdentityGroup', 'New-OCIIdentityIdpGroupMapping', 'New-OCIIdentityMfaTotpDevice', 'New-OCIIdentityNetworkSource', 'New-OCIIdentityOAuthClientCredential', 'New-OCIIdentityOrResetUIPassword', 'New-OCIIdentityPolicy', 'New-OCIIdentityProvider', 'New-OCIIdentityRegionSubscription', 'New-OCIIdentitySmtpCredential', 'New-OCIIdentitySwiftPassword', 'New-OCIIdentityTag', 'New-OCIIdentityTagDefault', 'New-OCIIdentityTagNamespace', 'New-OCIIdentityTotpSeed', 'New-OCIIdentityUser', 'Remove-OCIIdentityApiKey', 'Remove-OCIIdentityAuthToken', 'Remove-OCIIdentityCompartment', 'Remove-OCIIdentityCustomerSecretKey', 'Remove-OCIIdentityDbCredential', 'Remove-OCIIdentityDomain', 'Remove-OCIIdentityDynamicGroup', 'Remove-OCIIdentityGroup', 'Remove-OCIIdentityIdpGroupMapping', 'Remove-OCIIdentityMfaTotpDevice', 'Remove-OCIIdentityNetworkSource', 'Remove-OCIIdentityOAuthClientCredential', 'Remove-OCIIdentityPolicy', 'Remove-OCIIdentityProvider', 'Remove-OCIIdentitySmtpCredential', 'Remove-OCIIdentitySwiftPassword', 'Remove-OCIIdentityTag', 'Remove-OCIIdentityTagDefault', 'Remove-OCIIdentityTagDefaultLock', 'Remove-OCIIdentityTagNamespace', 'Remove-OCIIdentityTagNamespaceLock', 'Remove-OCIIdentityUser', 'Remove-OCIIdentityUserFromGroup', 'Reset-OCIIdentityIdpScimClient', 'Restore-OCIIdentityCompartment', 'Update-OCIIdentityAuthenticationPolicy', 'Update-OCIIdentityAuthToken', 'Update-OCIIdentityCompartment', 'Update-OCIIdentityCustomerSecretKey', 'Update-OCIIdentityDomain', 'Update-OCIIdentityDynamicGroup', 'Update-OCIIdentityGroup', 'Update-OCIIdentityIdpGroupMapping', 'Update-OCIIdentityNetworkSource', 'Update-OCIIdentityOAuthClientCredential', 'Update-OCIIdentityPolicy', 'Update-OCIIdentityProvider', 'Update-OCIIdentitySmtpCredential', 'Update-OCIIdentitySwiftPassword', 'Update-OCIIdentityTag', 'Update-OCIIdentityTagDefault', 'Update-OCIIdentityTagNamespace', 'Update-OCIIdentityUser', 'Update-OCIIdentityUserCapabilities', 'Update-OCIIdentityUserState', 'Write-OCIIdentityApiKey' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Identity' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_63_50.ps1
sample_63_50.ps1
Import-LocalizedData -BindingVariable lbsTxt -FileName AzStackHci.Bootstrap.Strings.psd1 <# probably not needed would contain any tests for bootstrap that dont exist or fit in other validators #> Export-ModuleMember -Function Test-* # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBT+xjsxVeB9ldE # rc0htouxEwpE4jAPL11AEihOzFLWmaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIE8WTX75a+rhsw8WlWdZ1nfl # H9bx0FUqZbSLgfyFoFViMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAoY8lBCqonLKh/Oq8yGaJ8cNRIFZmbKaetiML53WwEPpUMAaaT4F0O0ww # AhMPtasRVxESE2tmSSbCZU3lMSuUxN83w70I0g94NHewwPrd8iXJFwpEjTf+ydjD # MikQkSScTTLMWGT6C9WHhORpwQAydytZ8n8B2Y1+v+I0BQ6fOwSrjUYpEryTeb7q # pAjwJBqBupenl9eu8q65eOxB2grvnoauk47rX+h8o+R+10AteiuxzdOPkrGRC9cL # qpdJ2zd0vf2vvoy+MiFDpjdkX3QzzMdxawaJ2B47OiJKz0m+Rm29pKww2IZNYYzu # kNTyZLY1S4ayoeXPRmGy7t+la2UgKqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCB3LFZnmY32CkakFPncDXKlYjmp5nvkjAguGgjpWIF51AIGZjOp4aw6 # GBMyMDI0MDUxNjE4NDQyNS40NjFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC # RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ # pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm # scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF # UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr # c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T # 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J # IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz # z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U # NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O # ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2 # UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx # /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh # Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t # 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0 # GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6 # vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu # dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY # nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ # 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z # 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC # V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH # BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf # v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv # E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnwnAgwIhgPMjAyNDA1MTYyMjUxNTJaGA8yMDI0MDUxNzIyNTE1MlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6fCcCAIBADAHAgEAAgIXqDAHAgEAAgIRgTAKAgUA # 6fHtiAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAF9eSLSLQKipJTTTaY4c # 0F1vlCQAMyG6Qt0jL02K36614fHgV8B0ErR/iXHlNRZdFTI2782ssG/D6CijJ3AH # TxafoggArkBMNiLuXdqJVmPvVqrKRMsghmv3sw5C1hUvao5DbIREZZptic1WQxq4 # juoCt2jLCFJr6m5/xQ7y4/L1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgZknNZWMmIh1oBF9KCuMfd/MR/QkpD5ZkkAgKkGCtiAswgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xyMuYm # KjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9 # m5ocaIMiAAEAAAHjMCIEINSVRnUuYBeZqM4TwZYP+bWXmQhX8PsgoHifPm9NVR98 # MA0GCSqGSIb3DQEBCwUABIICAEOfHP4qnpyW1YzcHGMT4suhvn0IZVYHO38x4eE9 # 1L+k59ehmTj5/oX9E/jYh4V3uDxdJfrYyECJ9cB131AKoAieetIajLONgUJoGpB1 # 9ohR81HVlBF5dAsgK/zpvmsLYmGqwhH5PlY2cCr0ESDHN3PEy4cxWVzhcNmUZEZA # 2PF8ayNg5bNYtnnbHVqqqqEOBq9w6whJZbkRl8mR77QrNTyev18JBK58+9NN7P7P # ViiJvVnYpakzjegW/6KHdeMlXFx9iAEUuS6ZM4dMVAkcSgV+6QoeWk9aoFcIGybq # KueR1wlL48amiJw8sQA0se1Eyi8HZr2+lWjKqC1fJuXvqIv1MXxXD44UHIB3dzwC # thLwE2Y/4pPSAqgM1JDYJSaozrSgSl8ByYJHSds0Bui0M9KXnFOLfN+Dp+eIiu0L # NwEXNTX/EMqLMW2f2iZfpL44w365DNtankm375FrG2doFeSOKp5W45p1YCMmNvyW # 2HX2ZdDPZm05gSknTW/yV4rB9WZy5c0hI4jfRyYPC3WQTUJeK4ESPRprqfq1Hag8 # +c+tSi+VzUIcHL6TK+1K4UMsnx7lhIB4XoMTWmKGzM2j/KtMhTz1evkb+fgqgDbo # QQhcsQn7RRK5/roLt7x37h+rGIgMu9pGYmnyoAb0fQpKG9B9UZtSFKQAwek//zsA # /fw6 # SIG # End signature block
combined_dataset/train/non-malicious/sample_56_37.ps1
sample_56_37.ps1
#requires -Version 5.0 enum BcArtifactSource { OnPrem Sandbox Insider } #Import-Module (Join-Path $PSScriptRoot ClientContext\ClientContext.psd1) #Import-Module (Join-Path $PSScriptRoot ClientContext\ClientContext.psm1) #. "$PSScriptRoot\ClientContext\ClientContextLibLoader.ps1" -BcLibVersion (Get-SelectedBcVersion) Import-Module (Join-Path $PSScriptRoot EntraIdAuth\EntraIdAuth.psm1) Import-Module (Join-Path $PSScriptRoot ALTestRunnerInternal.psm1) Import-Module (Join-Path $PSScriptRoot ALTestRunner.psm1) #Import-Module (Join-Path $PSScriptRoot ALExtBridge\ALExtBridge.psd1) #Import-Module (Join-Path $PSScriptRoot ALExtBridge\ALExtBridge.psm1) function Invoke-NPALTests { [CmdletBinding()] param ( [Parameter(Mandatory=$false)] [string]$SmbAlExtPath, [Parameter(Mandatory=$false)] [ValidateSet('All','Codeunit','Test')] [string]$Tests = 'All', [Parameter(Mandatory=$false)] [string]$FileName = '', [Parameter(Mandatory=$false)] [int]$SelectionStart = 0, [Parameter(Mandatory=$false)] [string]$ExtensionId, [Parameter(Mandatory=$false)] [string]$ExtensionName, [Parameter(Mandatory = $false)] [switch]$GetCodeCoverage, [Parameter(Mandatory = $false)] $DisabledTests, [switch]$GetPerformanceProfile, [string]$ResultsFilePath ) $Params = @{} $environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType' $tenant = Get-ValueFromLaunchJson -KeyName 'tenant' $serviceUrl = Get-ServiceUrl Test-ServiceIsRunningAndHealthy # Let's check version and already loaded modules (if any) and eventually load/import ClientContext assemblies and types. $Version = Get-SelectedBcVersion if ($global:ClientContextLoadedModuleVersion -ne $Version) { Push-Location try { Set-Location $PSScriptRoot . (Join-Path $PSScriptRoot -ChildPath 'ClientContext' -AdditionalChildPath 'ClientContextLibLoader.ps1') -BcLibVersion $Version . (Join-Path $PSScriptRoot 'ClientSessionLibLoader.ps1') $global:ClientContextLoadedModuleVersion = $Version } catch { Write-Error "Can't import ClientContext module for BC version $Version. Details: $_" } finally { Pop-Location } } switch ($environmentType) { OnPrem { $serviceUrlCredCacheKey = Get-ServiceUrlCredentialCacheKey $serviceUrlCredCacheKey = $serviceUrlCredCacheKey.ToLower(); $creds = Get-NavUserPasswordCredentials -SmbAlExtPath $SmbAlExtPath -WebClientUrl $serviceUrlCredCacheKey if (!$creds) { throw "Can't find credential for the key $serviceUrlCredCacheKey!" } [securestring]$secStringPassword = ConvertTo-SecureString $creds.Password -AsPlainText -Force [pscredential]$creds = New-Object System.Management.Automation.PSCredential ($creds.Username, $secStringPassword) if (!$creds) { throw "Can't find credentials in the AL development credential cache for $serviceUrlCredCacheKey!" } $Params.Add('Credential', $creds) $Params.Add('AutorizationType', 'NavUserPassword') } Sandbox { # Sandbox with AAD auth. $environmentName = Get-ValueFromLaunchJson -KeyName 'environmentName' if (!$bcAuthContext) { $bcAuthContext = New-BcAuthContext -includeDeviceLogin } $bcAuthContext = Renew-BcAuthContext $bcAuthContext $Global:BCAuthContext = $bcAuthContext #$accessToken = $bcAuthContext.accessToken #$credential = New-Object pscredential -ArgumentList $bcAuthContext.upn, (ConvertTo-SecureString -String $accessToken -AsPlainText -Force) $response = Invoke-RestMethod -Method Get -Uri "https://businesscentral.dynamics.com/$($bcAuthContext.tenantID)/$environmentName/deployment/url" if($response.status -ne 'Ready') { throw "environment not ready, status is $($response.status)" } $useUrl = $response.data.Split('?')[0] $tenant = ($response.data.Split('?')[1]).Split('=')[1] $publicWebBaseUrl = $useUrl.TrimEnd('/') $serviceUrl = "$publicWebBaseUrl/cs?tenant=$tenant" if ($companyName) { $serviceUrl += "&company=$([Uri]::EscapeDataString($companyName))" } $Params.Add('AutorizationType', 'AAD') } Default { throw "Environment type '$environmentType' is not supported!" } } if ($FileName -ne '') { if (Get-FileIsTestCodeunit -FileName $FileName) { $Params.Add('TestCodeunitsRange', (Get-ObjectIdFromFile $FileName)) } else { throw "$FileName is not an AL test codeunit" } } if ($SelectionStart -ne 0) { $TestName = Get-TestNameFromSelectionStart -Path $FileName -SelectionStart $SelectionStart if ($TestName -eq '') { throw "Please place the cursor within the test method that you want to run and try again." } else { $Params.Add('TestProcedureRange', $TestName) } } if (-not [string]::IsNullOrEmpty($ResultsFilePath)) { $Params.Add('ResultsFilePath', $ResultsFilePath) $Params.Add('SaveResultFile', $true); } else { $Params.Add('SaveResultFile', $false); } Run-AlTests -ServiceUrl $serviceUrl @Params } function Get-OnPremServiceUrlCredentialKey { [CmdletBinding()] param ( [CmdletBinding(Mandatory=$true)] [string]$ServiceUrl ) $url = ([System.Uri]$ServiceUrl).AbsoluteUri.Replace('/','_').Replace('__','//') return $url } function Get-ServiceUrl { [CmdletBinding()] param ( ) $environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType' switch ($environmentType) { OnPrem { # TODO: Optimize => Read once and then parse each property. $server = Get-ValueFromLaunchJson -KeyName 'server' $serverInstance = Get-ValueFromLaunchJson -KeyName 'serverInstance' $port = Get-ValueFromLaunchJson -KeyName 'port' $tenant = Get-ValueFromLaunchJson -KeyName 'tenant' $serviceUrl = "$($server.TrimEnd('/'))" if (-not ([string]::IsNullOrEmpty($port))) { $serviceUrl = "$serviceUrl`:$port" } $serviceUrl = "$serviceUrl/$serverInstance" if (-not ([string]::IsNullOrEmpty($tenant))) { $serviceUrl = "$serviceUrl/?tenant=$tenant" } return $serviceUrl } Sandbox { # TODO: Base URL for SaaS maybe configurable? $serviceUrl = 'https://businesscentral.dynamics.com/' $environmentName = Get-ValueFromLaunchJson -KeyName 'environmentName' $tenant = Get-ValueFromLaunchJson -KeyName 'tenant' $serviceUrl = "$($serviceUrl.TrimEnd('/'))/$tenant/$environmentName/deployment/url" $response = Invoke-RestMethod -Method Get -Uri $serviceUrl $useUrl = $response.data.Split('?')[0] $tenant = ($response.data.Split('?')[1]).Split('=')[1] $publicWebBaseUrl = $useUrl.TrimEnd('/') $serviceUrl = "$publicWebBaseUrl/cs?tenant=$tenant" return $serviceUrl } Default { throw "Environment type '$environmentType' is not supported!" } } } function Get-ServiceUrlCredentialCacheKey { [CmdletBinding()] param ( ) $environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType' switch ($environmentType) { OnPrem { # TODO: Optimize => Read once and then parse each property. $server = Get-ValueFromLaunchJson -KeyName 'server' $serverInstance = Get-ValueFromLaunchJson -KeyName 'serverInstance' $port = Get-ValueFromLaunchJson -KeyName 'port' $tenant = Get-ValueFromLaunchJson -KeyName 'tenant' $serviceUrl = "$($server.TrimEnd('/'))" if (-not ([string]::IsNullOrEmpty($port))) { $serviceUrl = "$serviceUrl`:$port" } $serviceUrl = ([System.Uri]$serviceUrl).AbsoluteUri.TrimEnd('/') $serviceUrl = "$serviceUrl`_$serverInstance" <# The 'UserPasswordCache.dat' file contains entries without tenant id so let's remove the next code: if ((-not ([string]::IsNullOrEmpty($tenant))) -and ($tenant -ne 'default')) { $serviceUrl = "$serviceUrl?tenant=$tenant" } #> return $serviceUrl } Sandbox { # TODO: Base URL for SaaS maybe configurable? throw "Not implemented yet!" $serviceUrl = 'https://businesscentral.dynamics.com/' $environmentName = Get-ValueFromLaunchJson -KeyName 'environmentName' $tenant = Get-ValueFromLaunchJson -KeyName 'tenant' $serviceUrl = "$($serviceUrl.TrimEnd('/'))/$tenant/$environmentName/deployment/url" $response = Invoke-RestMethod -Method Get -Uri $serviceUrl $useUrl = $response.data.Split('?')[0] $tenant = ($response.data.Split('?')[1]).Split('=')[1] $publicWebBaseUrl = $useUrl.TrimEnd('/') $serviceUrl = "$publicWebBaseUrl/cs?tenant=$tenant" return $serviceUrl } Default { throw "Environment type '$environmentType' is not supported!" } } } function Get-ServiceHealthUrl { [CmdletBinding()] param ( ) $environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType' switch ($environmentType) { OnPrem { $server = Get-ValueFromLaunchJson -KeyName 'server' $serverInstance = Get-ValueFromLaunchJson -KeyName 'serverInstance' $port = Get-ValueFromLaunchJson -KeyName 'port' $serviceUrl = "$($server.TrimEnd('/'))" if (-not ([string]::IsNullOrEmpty($port))) { $serviceUrl = "$serviceUrl`:$port" } $serviceUrl = "$serviceUrl/$serverInstance" if (-not ([string]::IsNullOrEmpty($tenant))) { $serviceUrl = "$serviceUrl/Health/System" } return $serviceUrl } Default { throw "Environment type '$environmentType' is not supported!" } } } function Test-ServiceIsRunningAndHealthy { param ( ) $environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType' switch ($environmentType) { OnPrem { $healthServiceUrl = Get-ServiceHealthUrl $serviceUrl = Get-ServiceUrl $healthCheckResult = $null try { $healthCheckResult = Invoke-WebRequest -Uri $healthServiceUrl -UseBasicParsing -TimeoutSec 10 } catch { $healthCheckResult = $null } if ((!$healthCheckResult) -or ($healthCheckResult.StatusCode -ne 200)) { throw "$serviceUrl is not available. Please start the container, or check NST, eventually retry." } } Default { # For SaaS Sandboxes we don't have any method without authentication so we have to be authenticated first. # So let's consider the environment is up and user knows about the real state before development and testing. } } } function Get-VSCodeExtensionRootPath { [CmdletBinding()] param ( ) $currentPath = $PSScriptRoot while ($currentPath) { $manifestFile = Get-ChildItem -Path $currentPath -Filter 'package.json' if ($manifestFile) { return $currentPath } $currentPath = Split-Path $currentPath -ErrorAction SilentlyContinue } throw "Can't find VSCode extension root path." } function Get-VSCodeExtensionInternalFolderPath { [CmdletBinding()] param ( ) $rootPath = Get-VSCodeExtensionRootPath $internalPath = Join-Path $rootPath '.altestrunner' if (!(Test-Path $internalPath)) { $null = New-Item $internalPath -ItemType Directory -Force } return $internalPath } function Get-VSCodeExtensionClientContextLibsRootPath { [CmdletBinding()] param ( ) $path = Get-VSCodeExtensionInternalFolderPath $path = Join-Path $path 'CSLibs' if (!(Test-Path $path)) { $null = New-Item $path -ItemType Directory -Force } return $path } function Get-RipUnzipExeFilePath { [CmdletBinding()] param ( ) $vsCodeExtRootPath = Get-VSCodeExtensionRootPath $ripUnzipPath = Join-Path $vsCodeExtRootPath '.bin' -AdditionalChildPath 'ripunzip', 'ripunzip.exe' if (!(Test-Path $ripUnzipPath)) { throw "'ripunzip.exe' path $ripUnzipPath doesn't exist!" } return $ripUnzipPath } function Invoke-RipUnzip { [CmdletBinding()] param ( [Parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [string]$Uri, [Parameter(Mandatory=$true)] [string]$DestinationPath, [string]$ExtractionFilter ) $ripUnzipPath = Get-RipUnzipExeFilePath $cmd = "$ripUnzipPath unzip-uri -d $DestinationPath $Uri $ExtractionFilter" Invoke-Expression -Command $cmd if (!($?)) { throw "'ripunzip' execution error. It's possible msvcp140.dll ()" } } function Get-ClientSessionLibrariesFromBcArtifacts { [CmdletBinding()] param ( [string]$BcArtifactSourceUrl, [Parameter(Mandatory=$true)] [string]$Version ) $BcArtifactSourceUrl = $BcArtifactSourceUrl.TrimEnd("/") $BcArtifactSourceUrl = "$BcArtifactSourceUrl/$Version/platform" Set-SelectedBcVersion -BcVersion $Version $destPath = Get-SelectedBcVersionLibPath if (!(Test-Path $destPath)) { $null = New-Item -Path $destPath -ItemType Directory -Force } Invoke-RipUnzip -Uri $BcArtifactSourceUrl -DestinationPath $destPath -ExtractionFilter "'?pplications\*\?est?unner\?nternal\*.dll'" } function Import-ClientContextModule { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string]$Version ) if ($global:ClientContextLoadedModuleVersion) { if ($global:ClientContextLoadedModuleVersion -eq $Version) { return } } try { . (Join-Path $PSScriptRoot -ChildPath 'ClientContext' -AdditionalChildPath 'ClientContextLibLoader.ps1') -BcLibVersion $Version $global:ClientContextLoadedModuleVersion = $Version } catch { Write-Error "Can't import ClientContext module for BC version $Version. Details: $_" } } $code = @" using Microsoft.AspNetCore.DataProtection; using System.Text; using System.IO; namespace ALCredentialCacheLibrary { public static class ALCredentailCacheReader { public static string GetDataFromCredentialCache(string credentialFolderPath, string credentialCacheFileName) { var credentailFilePath = Path.Combine(credentialFolderPath, credentialCacheFileName); if (!File.Exists(credentailFilePath)) throw new FileNotFoundException(string.Format("Credential file {0} doesn't exist!", credentailFilePath)); var bytes = File.ReadAllBytes(credentailFilePath); var purpose = new string[] { "Microsoft.Dynamics.Nav.Deployment", credentialCacheFileName }; var dirInfo = new DirectoryInfo(credentialFolderPath); var provider = DataProtectionProvider.Create(dirInfo); var protector = provider.CreateProtector(purpose); return Encoding.UTF8.GetString(protector.Unprotect(bytes)); } } } "@ function Get-MsbAlExtBinariesPath { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string]$msDynamicsSmbAlExtPath ) # TODO: What about macOS (OS X) or Linux? return (Join-Path $msDynamicsSmbAlExtPath '\bin\win32\') } function Get-ExternalLibraries { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string]$msDynamicsSmbAlExtPath ) $libs = @() # TODO: What about macOS (OS X) or Linux? $Global:MsDynamicsSmbAlExtPath = $msDynamicsSmbAlExtPath $Global:MsDynamicsSmbAlExtLibPath = Get-MsbAlExtBinariesPath -msDynamicsSmbAlExtPath $msDynamicsSmbAlExtPath $libPath = $Global:MsDynamicsSmbAlExtLibPath $libs += Join-Path $libPath "Microsoft.AspNetCore.DataProtection.dll" $libs += Join-Path $libPath "Microsoft.AspNetCore.DataProtection.Abstractions.dll" $libs += Join-Path $libPath "Microsoft.AspNetCore.DataProtection.Extensions.dll" $libs += Join-Path $libPath "Microsoft.AspNetCore.Cryptography.Internal.dll" $libs += Join-Path $libPath "Microsoft.AspNetCore.Connections.Abstractions.dll" #$libs += Join-Path $libPath "mscorlib.dll" $libs += Join-Path $libPath "System.dll" $libs += Join-Path $libPath "System.Runtime.dll" $libs += Join-Path $libPath "System.IO.FileSystem.dll" return $libs } function Get-NavUserPasswordCredentials { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string]$SmbAlExtPath, [Parameter(Mandatory=$true)] [string]$WebClientUrl ) $creds = Get-ALDevCacheFileContent -SmbAlExtPath $SmbAlExtPath -FileName UserPasswordCache.dat -ReturnPSObject if (!$creds) { throw "You should authenticate using standard AL dev approach. Then you can try again." } $record = $creds.$WebClientUrl if (!$record) { throw "You were not authenticated against $WebClientUrl yet or the cache has expired. Please, authenticate using the standard Microsoft AL development extension and try again." } return $record } function Get-ALDevCacheFileContent { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string]$SmbAlExtPath, [Parameter(Mandatory=$true)] [ValidateSet("UserPasswordCache.dat", "TokenKeyCache.dat", "TokenCache.dat", "TenantMapCache.dat", "ServerInfoCache.dat")] [string]$FileName, [switch]$ReturnPSObject ) if (-not ('ALCredentialCacheLibrary.ALCredentailCacheReader' -as [type])) { $assemblies = Get-ExternalLibraries -msDynamicsSmbAlExtPath $SmbAlExtPath $assemblies | ForEach-Object { [void][Reflection.Assembly]::LoadFrom($_) } $credentialReader = Add-Type -TypeDefinition $code -Language CSharp -ReferencedAssemblies (Get-ExternalLibraries -msDynamicsSmbAlExtPath $SmbAlExtPath) -WarningAction Ignore -IgnoreWarnings -PassThru } else { $credentialReader = [ALCredentialCacheLibrary.ALCredentailCacheReader] } $SmbAlExtBinPath = Join-Path $SmbAlExtPath '\bin\win32\' $smbAlCacheFilePath = Join-Path $SmbAlExtBinPath $FileName if (-not (Test-Path $smbAlCacheFilePath)) { Write-Error "Requested credential cache file $FileName doesn't exist. Please, authenticate using the standard Microsoft AL development extension first and then try again." } try { $fileContent = $credentialReader::GetDataFromCredentialCache($SmbAlExtBinPath,$FileName) } catch { Write-Error "Can not decrypt file $FileName. $($_.Exception)" } if (!$ReturnPSObject) { return $fileContent } $fileContentObject = ConvertFrom-Json $fileContent return $fileContentObject } function Get-NavUserPasswordCredentialsNotWorking { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string]$WebClientUrl ) #$purpose = @("Microsoft.Dynamics.Nav.Deployment", "UserPasswordCache.dat") $purpose = New-Object System.Collections.Generic.List[System.String] $purpose.Add('Microsoft.Dynamics.Nav.Deployment') $purpose.Add('UserPasswordCache.dat') $protectedFile = Join-Path $Global:MsDynamicsSmbAlExtLibPath $purpose[1] #$dirInfo = New-Object System.IO.DirectoryInfo -ArgumentList $Global:MsDynamicsSmbAlExtLibPath $dirInfo = New-Object "System.IO.DirectoryInfo, Version=6.0.0.0" -ArgumentList $Global:MsDynamicsSmbAlExtLibPath $provider = [Microsoft.AspNetCore.DataProtection.DataProtectionProvider]::Create($dirInfo) $protector = $provider.CreateProtector($purpose); $bytes = [System.IO.File]::ReadAllBytes($protectedFile) $unprotectedValues = $protector.Unprotect($bytes); $unprotectedString = [System.Text.Encoding]::UTF8.GetString($unprotectedValues) Write-Host "Creds: $unprotectedString" #[Microsoft.AspNetCore.DataProtection.DataProtectionProvider]::Create(() } function Get-SelectedBcVersion { [CmdletBinding()] param( ) $global:SelectedBcVersion = Get-ValueFromALTestRunnerConfig -KeyName 'selectedBcVersion' if ([string]::IsNullOrEmpty($global:SelectedBcVersion)) { throw "You have to select BC version and eventually download missing libraries." } return $global:SelectedBcVersion } function Set-SelectedBcVersion { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string]$BcVersion ) $global:SelectedBcVersion = Set-ALTestRunnerConfigValue -KeyName 'selectedBcVersion' -KeyValue $BcVersion return $global:SelectedBcVersion } function Get-SelectedBcVersionLibPath { [CmdletBinding()] param( ) $path = Get-VSCodeExtensionClientContextLibsRootPath $destPath = Join-Path $path (Get-SelectedBcVersion) return $destPath } ########################## # From BcContainerHelper # ########################## function Parse-JWTtoken([string]$token) { if ($token.Contains(".") -and $token.StartsWith("eyJ")) { $tokenPayload = $token.Split(".")[1].Replace('-', '+').Replace('_', '/') while ($tokenPayload.Length % 4) { $tokenPayload += "=" } return [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($tokenPayload)) | ConvertFrom-Json } throw "Invalid token" } function Test-BcAuthContext { Param( $bcAuthContext ) if (!(($bcAuthContext -is [Hashtable]) -and ($bcAuthContext.ContainsKey('ClientID')) -and ($bcAuthContext.ContainsKey('Credential')) -and ($bcAuthContext.ContainsKey('authority')) -and ($bcAuthContext.ContainsKey('RefreshToken')) -and ($bcAuthContext.ContainsKey('UtcExpiresOn')) -and ($bcAuthContext.ContainsKey('tenantID')) -and ($bcAuthContext.ContainsKey('AccessToken')) -and ($bcAuthContext.ContainsKey('includeDeviceLogin')) -and ($bcAuthContext.ContainsKey('deviceLoginTimeout')))) { throw 'BcAuthContext should be a HashTable created by New-BcAuthContext.' } } $Global:ExtensionSystemFolderPath = Get-ALTestRunnerConfigPath -ReturnFolderPath #$global:SelectedBcVersion = Get-SelectedBcVersion #$Global:ClientSessionLibsPath = Get-SelectedBcVersionLibPath Export-ModuleMember -Function *
combined_dataset/train/non-malicious/3017.ps1
3017.ps1
Set-StrictMode -Version Latest if ($PSVersionTable.PSVersion.Major -le 2) { return } InModuleScope Pester { function Clear-WhiteSpace ($Text) { "$($Text -replace "(`t|`n|`r)"," " -replace "\s+"," " -replace "\s*<","<" -replace ">\s*", ">")".Trim() } Describe 'Code Coverage Analysis' { $root = (Get-PSDrive TestDrive).Root $rootSubFolder = Join-Path -Path $root -ChildPath TestSubFolder $null = New-Item -Path $rootSubFolder -ItemType Directory -ErrorAction SilentlyContinue $testScriptPath = Join-Path -Path $root -ChildPath TestScript.ps1 $testScript2Path = Join-Path -Path $root -ChildPath TestScript2.ps1 $testScript3Path = Join-Path -Path $rootSubFolder -ChildPath TestScript3.ps1 $null = New-Item -Path $testScriptPath -ItemType File -ErrorAction SilentlyContinue Set-Content -Path $testScriptPath -Value @' function FunctionOne { function NestedFunction { 'I am the nested function.' 'I get fully executed.' } if ($true) { 'I am functionOne' NestedFunction } if ($false) { 'I cannot get called.' } Invoke-Command { 'I get called.' } } function FunctionTwo { 'I am function two. I never get called.' } FunctionOne '@ if ($PSVersionTable.PSVersion.Major -ge 5) { Add-Content -Path $testScriptPath -Value @' class MyClass { MyClass() { 'I am the constructor.' } MethodOne() { 'I am method one.' } hidden static MethodTwo() { 'I am method two. I never get called.' } } $class = [MyClass]::new() $class.MethodOne() '@ } else { Add-Content -Path $testScriptPath -Value @' function MyClass { 'I am the constructor.' } function MethodOne { 'I am method one.' } function MethodTwo { 'I am method two. I never get called.' } MyClass MethodOne '@ } $null = New-Item -Path $testScript2Path -ItemType File -ErrorAction SilentlyContinue Set-Content -Path $testScript2Path -Value @' 'Some {0} file' ` -f ` 'other' '@ $null = New-Item -Path $testScript3Path -ItemType File -ErrorAction SilentlyContinue Set-Content -Path $testScript3Path -Value @' 'Some {0} file' ` -f ` 'other' '@ Context 'Entire file' { $testState = New-PesterState -Path $root Enter-CoverageAnalysis -CodeCoverage $testScriptPath, $testScriptPath, $testScript2Path, $testScript3Path -PesterState $testState It 'Has the proper number of breakpoints defined' { $testState.CommandCoverage.Count | Should -Be 18 } $null = & $testScriptPath $null = & $testScript2Path $null = & $testScript3Path $coverageReport = Get-CoverageReport -PesterState $testState It 'Reports the proper number of executed commands' { $coverageReport.NumberOfCommandsExecuted | Should -Be 15 } It 'Reports the proper number of analyzed commands' { $coverageReport.NumberOfCommandsAnalyzed | Should -Be 18 } It 'Reports the proper number of analyzed files' { $coverageReport.NumberOfFilesAnalyzed | Should -Be 3 } It 'Reports the proper number of missed commands' { $coverageReport.MissedCommands.Count | Should -Be 3 } It 'Reports the correct missed command' { $coverageReport.MissedCommands[0].Command | Should -Be "'I cannot get called.'" $coverageReport.MissedCommands[1].Command | Should -Be "'I am function two. I never get called.'" $coverageReport.MissedCommands[2].Command | Should -Be "'I am method two. I never get called.'" } It 'Reports the proper number of hit commands' { $coverageReport.HitCommands.Count | Should -Be 15 } It 'Reports the correct hit command' { $coverageReport.HitCommands[0].Command | Should -Be "'I am the nested function.'" } It 'Reports the correct class names' { $coverageReport.HitCommands[0].Class | Should -BeNullOrEmpty if ($PSVersionTable.PSVersion.Major -ge 5) { $coverageReport.HitCommands[9].Class | Should -Be 'MyClass' $coverageReport.MissedCommands[2].Class | Should -Be 'MyClass' } else { $coverageReport.HitCommands[9].Class | Should -BeNullOrEmpty $coverageReport.MissedCommands[2].Class | Should -BeNullOrEmpty } } It 'Reports the correct function names' { $coverageReport.HitCommands[0].Function | Should -Be 'NestedFunction' $coverageReport.HitCommands[2].Function | Should -Be 'FunctionOne' $coverageReport.HitCommands[9].Function | Should -Be 'MyClass' $coverageReport.MissedCommands[2].Function | Should -Be 'MethodTwo' } It 'JaCoCo report must be correct' { [String]$jaCoCoReportXml = Get-JaCoCoReportXml -PesterState $testState -CoverageReport $coverageReport $jaCoCoReportXml = $jaCoCoReportXml -replace 'Pester \([^\)]*', 'Pester (date' $jaCoCoReportXml = $jaCoCoReportXml -replace 'start="[0-9]*"', 'start=""' $jaCoCoReportXml = $jaCoCoReportXml -replace 'dump="[0-9]*"', 'dump=""' $jaCoCoReportXml = $jaCoCoReportXml -replace "$([System.Environment]::NewLine)", '' $jaCoCoReportXml = $jaCoCoReportXml -replace "$(Split-Path -Path $root -Leaf)", 'CommonRoot' $jaCoCoReportXml = $jaCoCoReportXml.Replace($root.Replace('\', '/'), '') (Clear-WhiteSpace $jaCoCoReportXml) | Should -Be (Clear-WhiteSpace ' <?xml version="1.0" encoding="UTF-8" standalone="no"?> <!DOCTYPE report PUBLIC "-//JACOCO//DTD Report 1.1//EN" "report.dtd"> <report name="Pester (date)"> <sessioninfo id="this" start="" dump="" /> <package name="CommonRoot"> <class name="CommonRoot/TestScript" sourcefilename="TestScript.ps1"> <method name="NestedFunction" desc="()" line="5"> <counter type="INSTRUCTION" missed="0" covered="2" /> <counter type="LINE" missed="0" covered="2" /> <counter type="METHOD" missed="0" covered="1" /> </method> <method name="FunctionOne" desc="()" line="9"> <counter type="INSTRUCTION" missed="1" covered="6" /> <counter type="LINE" missed="0" covered="5" /> <counter type="METHOD" missed="0" covered="1" /> </method> <method name="FunctionTwo" desc="()" line="22"> <counter type="INSTRUCTION" missed="1" covered="0" /> <counter type="LINE" missed="1" covered="0" /> <counter type="METHOD" missed="1" covered="0" /> </method> <method name="&lt;script&gt;" desc="()" line="25"> <counter type="INSTRUCTION" missed="0" covered="3" /> <counter type="LINE" missed="0" covered="3" /> <counter type="METHOD" missed="0" covered="1" /> </method> <method name="MyClass" desc="()" line="32"> <counter type="INSTRUCTION" missed="0" covered="1" /> <counter type="LINE" missed="0" covered="1" /> <counter type="METHOD" missed="0" covered="1" /> </method> <method name="MethodOne" desc="()" line="37"> <counter type="INSTRUCTION" missed="0" covered="1" /> <counter type="LINE" missed="0" covered="1" /> <counter type="METHOD" missed="0" covered="1" /> </method> <method name="MethodTwo" desc="()" line="42"> <counter type="INSTRUCTION" missed="1" covered="0" /> <counter type="LINE" missed="1" covered="0" /> <counter type="METHOD" missed="1" covered="0" /> </method> <counter type="INSTRUCTION" missed="3" covered="13" /> <counter type="LINE" missed="2" covered="12" /> <counter type="METHOD" missed="2" covered="5" /> <counter type="CLASS" missed="0" covered="1" /> </class> <class name="CommonRoot/TestScript2" sourcefilename="TestScript2.ps1"> <method name="&lt;script&gt;" desc="()" line="1"> <counter type="INSTRUCTION" missed="0" covered="1" /> <counter type="LINE" missed="0" covered="1" /> <counter type="METHOD" missed="0" covered="1" /> </method> <counter type="INSTRUCTION" missed="0" covered="1" /> <counter type="LINE" missed="0" covered="1" /> <counter type="METHOD" missed="0" covered="1" /> <counter type="CLASS" missed="0" covered="1" /> </class> <sourcefile name="TestScript.ps1"> <line nr="5" mi="0" ci="1" /> <line nr="6" mi="0" ci="1" /> <line nr="9" mi="0" ci="1" /> <line nr="11" mi="0" ci="1" /> <line nr="12" mi="0" ci="1" /> <line nr="15" mi="1" ci="1" /> <line nr="17" mi="0" ci="2" /> <line nr="22" mi="1" ci="0" /> <line nr="25" mi="0" ci="1" /> <line nr="32" mi="0" ci="1" /> <line nr="37" mi="0" ci="1" /> <line nr="42" mi="1" ci="0" /> <line nr="46" mi="0" ci="1" /> <line nr="47" mi="0" ci="1" /> <counter type="INSTRUCTION" missed="3" covered="13" /> <counter type="LINE" missed="2" covered="12" /> <counter type="METHOD" missed="2" covered="5" /> <counter type="CLASS" missed="0" covered="1" /> </sourcefile> <sourcefile name="TestScript2.ps1"> <line nr="1" mi="0" ci="1" /> <counter type="INSTRUCTION" missed="0" covered="1" /> <counter type="LINE" missed="0" covered="1" /> <counter type="METHOD" missed="0" covered="1" /> <counter type="CLASS" missed="0" covered="1" /> </sourcefile> <counter type="INSTRUCTION" missed="3" covered="14" /> <counter type="LINE" missed="2" covered="13" /> <counter type="METHOD" missed="2" covered="6" /> <counter type="CLASS" missed="0" covered="2" /> </package> <package name="CommonRoot/TestSubFolder"> <class name="CommonRoot/TestSubFolder/TestScript3" sourcefilename="TestScript3.ps1"> <method name="&lt;script&gt;" desc="()" line="1"> <counter type="INSTRUCTION" missed="0" covered="1" /> <counter type="LINE" missed="0" covered="1" /> <counter type="METHOD" missed="0" covered="1" /> </method> <counter type="INSTRUCTION" missed="0" covered="1" /> <counter type="LINE" missed="0" covered="1" /> <counter type="METHOD" missed="0" covered="1" /> <counter type="CLASS" missed="0" covered="1" /> </class> <sourcefile name="TestScript3.ps1"> <line nr="1" mi="0" ci="1" /> <counter type="INSTRUCTION" missed="0" covered="1" /> <counter type="LINE" missed="0" covered="1" /> <counter type="METHOD" missed="0" covered="1" /> <counter type="CLASS" missed="0" covered="1" /> </sourcefile> <counter type="INSTRUCTION" missed="0" covered="1" /> <counter type="LINE" missed="0" covered="1" /> <counter type="METHOD" missed="0" covered="1" /> <counter type="CLASS" missed="0" covered="1" /> </package> <counter type="INSTRUCTION" missed="3" covered="15" /> <counter type="LINE" missed="2" covered="14" /> <counter type="METHOD" missed="2" covered="7" /> <counter type="CLASS" missed="0" covered="3" /> </report> ') } It 'Reports the right line numbers' { $coverageReport.HitCommands[$coverageReport.NumberOfCommandsExecuted - 1].Line | Should -Be 1 $coverageReport.HitCommands[$coverageReport.NumberOfCommandsExecuted - 1].StartLine | Should -Be 1 $coverageReport.HitCommands[$coverageReport.NumberOfCommandsExecuted - 1].EndLine | Should -Be 3 } It 'Reports the right column numbers' { $coverageReport.HitCommands[$coverageReport.NumberOfCommandsExecuted - 1].StartColumn | Should -Be 13 $coverageReport.HitCommands[$coverageReport.NumberOfCommandsExecuted - 1].EndColumn | Should -Be 24 } Exit-CoverageAnalysis -PesterState $testState } Context 'Single function with missed commands' { $testState = New-PesterState -Path $root Enter-CoverageAnalysis -CodeCoverage @{Path = $testScriptPath; Function = 'FunctionTwo'} -PesterState $testState It 'Has the proper number of breakpoints defined' { $testState.CommandCoverage.Count | Should -Be 1 } $null = & $testScriptPath $coverageReport = Get-CoverageReport -PesterState $testState It 'Reports the proper number of executed commands' { $coverageReport.NumberOfCommandsExecuted | Should -Be 0 } It 'Reports the proper number of analyzed commands' { $coverageReport.NumberOfCommandsAnalyzed | Should -Be 1 } It 'Reports the proper number of missed commands' { $coverageReport.MissedCommands.Count | Should -Be 1 } It 'Reports the correct missed command' { $coverageReport.MissedCommands[0].Command | Should -Be "'I am function two. I never get called.'" } It 'Reports the proper number of hit commands' { $coverageReport.HitCommands.Count | Should -Be 0 } Exit-CoverageAnalysis -PesterState $testState } Context 'Single function with no missed commands' { $testState = New-PesterState -Path $root Enter-CoverageAnalysis -CodeCoverage @{Path = $testScriptPath; Function = 'FunctionOne'} -PesterState $testState It 'Has the proper number of breakpoints defined' { $testState.CommandCoverage.Count | Should -Be 9 } $null = & $testScriptPath $coverageReport = Get-CoverageReport -PesterState $testState It 'Reports the proper number of executed commands' { $coverageReport.NumberOfCommandsExecuted | Should -Be 8 } It 'Reports the proper number of analyzed commands' { $coverageReport.NumberOfCommandsAnalyzed | Should -Be 9 } It 'Reports the proper number of missed commands' { $coverageReport.MissedCommands.Count | Should -Be 1 } It 'Reports the proper number of hit commands' { $coverageReport.HitCommands.Count | Should -Be 8 } It 'Reports the correct hit command' { $coverageReport.HitCommands[0].Command | Should -Be "'I am the nested function.'" } Exit-CoverageAnalysis -PesterState $testState } Context 'Range of lines' { $testState = New-PesterState -Path $root Enter-CoverageAnalysis -CodeCoverage @{Path = $testScriptPath; StartLine = 11; EndLine = 12 } -PesterState $testState It 'Has the proper number of breakpoints defined' { $testState.CommandCoverage.Count | Should -Be 2 } $null = & $testScriptPath $coverageReport = Get-CoverageReport -PesterState $testState It 'Reports the proper number of executed commands' { $coverageReport.NumberOfCommandsExecuted | Should -Be 2 } It 'Reports the proper number of analyzed commands' { $coverageReport.NumberOfCommandsAnalyzed | Should -Be 2 } It 'Reports the proper number of missed commands' { $coverageReport.MissedCommands.Count | Should -Be 0 } It 'Reports the proper number of hit commands' { $coverageReport.HitCommands.Count | Should -Be 2 } It 'Reports the correct hit command' { $coverageReport.HitCommands[0].Command | Should -Be "'I am functionOne'" } Exit-CoverageAnalysis -PesterState $testState } Context 'Function wildcard resolution' { $testState = New-PesterState -Path $root Enter-CoverageAnalysis -CodeCoverage @{Path = "$(Join-Path -Path $root -ChildPath *.ps1)"; Function = '*' } -PesterState $testState It 'Has the proper number of breakpoints defined' { $testState.CommandCoverage.Count | Should -Be 13 } $null = & $testScriptPath $coverageReport = Get-CoverageReport -PesterState $testState It 'Reports the proper number of executed commands' { $coverageReport.NumberOfCommandsExecuted | Should -Be 10 } It 'Reports the proper number of analyzed commands' { $coverageReport.NumberOfCommandsAnalyzed | Should -Be 13 } It 'Reports the proper number of analyzed files' { $coverageReport.NumberOfFilesAnalyzed | Should -Be 1 } It 'Reports the proper number of missed commands' { $coverageReport.MissedCommands.Count | Should -Be 3 } It 'Reports the correct missed command' { $coverageReport.MissedCommands[0].Command | Should -Be "'I cannot get called.'" $coverageReport.MissedCommands[1].Command | Should -Be "'I am function two. I never get called.'" } It 'Reports the proper number of hit commands' { $coverageReport.HitCommands.Count | Should -Be 10 } It 'Reports the correct hit command' { $coverageReport.HitCommands[0].Command | Should -Be "'I am the nested function.'" } Exit-CoverageAnalysis -PesterState $testState } if ($PSVersionTable.PSVersion.Major -ge 5) { Context 'Single class' { $testState = New-PesterState -Path $root Enter-CoverageAnalysis -CodeCoverage @{Path = $testScriptPath; Class = 'MyClass'} -PesterState $testState It 'Has the proper number of breakpoints defined' { $testState.CommandCoverage.Count | Should -Be 3 } $null = & $testScriptPath $coverageReport = Get-CoverageReport -PesterState $testState It 'Reports the proper number of executed commands' { $coverageReport.NumberOfCommandsExecuted | Should -Be 2 } It 'Reports the proper number of analyzed commands' { $coverageReport.NumberOfCommandsAnalyzed | Should -Be 3 } It 'Reports the proper number of missed commands' { $coverageReport.MissedCommands.Count | Should -Be 1 } It 'Reports the proper number of hit commands' { $coverageReport.HitCommands.Count | Should -Be 2 } Exit-CoverageAnalysis -PesterState $testState } Context 'Class wildcard resolution' { $testState = New-PesterState -Path $root Enter-CoverageAnalysis -CodeCoverage @{Path = $testScriptPath; Class = '*'} -PesterState $testState It 'Has the proper number of breakpoints defined' { $testState.CommandCoverage.Count | Should -Be 3 } $null = & $testScriptPath $coverageReport = Get-CoverageReport -PesterState $testState It 'Reports the proper number of executed commands' { $coverageReport.NumberOfCommandsExecuted | Should -Be 2 } It 'Reports the proper number of analyzed commands' { $coverageReport.NumberOfCommandsAnalyzed | Should -Be 3 } It 'Reports the proper number of missed commands' { $coverageReport.MissedCommands.Count | Should -Be 1 } It 'Reports the proper number of hit commands' { $coverageReport.HitCommands.Count | Should -Be 2 } Exit-CoverageAnalysis -PesterState $testState } Context 'Class and function filter' { $testState = New-PesterState -Path $root Enter-CoverageAnalysis -CodeCoverage @{Path = $testScriptPath; Class = 'MyClass'; Function = 'MethodTwo'} -PesterState $testState It 'Has the proper number of breakpoints defined' { $testState.CommandCoverage.Count | Should -Be 1 } $null = & $testScriptPath $coverageReport = Get-CoverageReport -PesterState $testState It 'Reports the proper number of executed commands' { $coverageReport.NumberOfCommandsExecuted | Should -Be 0 } It 'Reports the proper number of analyzed commands' { $coverageReport.NumberOfCommandsAnalyzed | Should -Be 1 } It 'Reports the proper number of missed commands' { $coverageReport.MissedCommands.Count | Should -Be 1 } It 'Reports the proper number of hit commands' { $coverageReport.HitCommands.Count | Should -Be 0 } Exit-CoverageAnalysis -PesterState $testState } } else { Context 'Single class when not supported' { $testState = New-PesterState -Path $root Enter-CoverageAnalysis -CodeCoverage @{Path = $testScriptPath; Class = 'MyClass'} -PesterState $testState It 'Has the proper number of breakpoints defined' { $testState.CommandCoverage.Count | Should -Be 0 } $null = & $testScriptPath $coverageReport = Get-CoverageReport -PesterState $testState It 'Reports the proper number of executed commands' { $coverageReport.NumberOfCommandsExecuted | Should -Be 0 } It 'Reports the proper number of analyzed commands' { $coverageReport.NumberOfCommandsAnalyzed | Should -Be 0 } It 'Reports the proper number of missed commands' { $coverageReport.MissedCommands.Count | Should -Be 0 } It 'Reports the proper number of hit commands' { $coverageReport.HitCommands.Count | Should -Be 0 } Exit-CoverageAnalysis -PesterState $testState } } } Describe 'Path resolution for test files' { $root = (Get-PSDrive TestDrive).Root $null = New-Item -Path $(Join-Path -Path $root -ChildPath TestScript.ps1) -ItemType File -ErrorAction SilentlyContinue $null = New-Item -Path $(Join-Path -Path $root -ChildPath TestScript.tests.ps1) -ItemType File -ErrorAction SilentlyContinue $null = New-Item -Path $(Join-Path -Path $root -ChildPath TestScript2.tests.ps1) -ItemType File -ErrorAction SilentlyContinue Context 'Using Path-input (auto-detect)' { It 'Excludes test files by default when using wildcard path' { $coverageInfo = Get-CoverageInfoFromUserInput "$(Join-Path -Path $root -ChildPath *)" $PesterTests = @($coverageInfo | Select-Object -ExpandProperty Path | Where-Object { $_ -match '\.tests.ps1$' }) $PesterTests | Should -BeNullOrEmpty } It 'Includes test files when specified in wildcard path' { $coverageInfo = Get-CoverageInfoFromUserInput "$(Join-Path -Path $root -ChildPath *.tests.ps1)" $PesterTests = @($coverageInfo | Select-Object -ExpandProperty Path | Where-Object { $_ -match '\.tests.ps1$' }) $PesterTests.Count | Should -Be 2 $PesterTests | Should -Contain $(Join-Path -Path $root -ChildPath TestScript.tests.ps1) $PesterTests | Should -Contain $(Join-Path -Path $root -ChildPath TestScript2.tests.ps1) } It 'Includes test file when targeted directly using filepath' { $path = Join-Path -Path $root -ChildPath TestScript.tests.ps1 $coverageInfo = Get-CoverageInfoFromUserInput $path $PesterTests = $coverageInfo | Select-Object -ExpandProperty Path $PesterTests | Should -Be $path } } Context 'Using object-input' { It 'Excludes test files when IncludeTests is not specified' { $coverageInfo = Get-CoverageInfoFromUserInput @{ Path = "$(Join-Path -Path $root -ChildPath TestScript.tests.ps1)" } $PesterTests = $coverageInfo | Select-Object -ExpandProperty Path $PesterTests | Should -BeNullOrEmpty } It 'Excludes test files when IncludeTests is false' { $coverageInfo = Get-CoverageInfoFromUserInput @{ Path = "$(Join-Path -Path $root -ChildPath TestScript.tests.ps1)"; IncludeTests = $false } $PesterTests = $coverageInfo | Select-Object -ExpandProperty Path $PesterTests | Should -BeNullOrEmpty } It 'Includes test files when IncludeTests is true' { $path = Join-Path -Path $root -ChildPath TestScript.tests.ps1 $coverageInfo = Get-CoverageInfoFromUserInput @{ Path = $path; IncludeTests = $true } $PesterTests = $coverageInfo | Select-Object -ExpandProperty Path $PesterTests | Should -Be $path } } } Describe 'Stripping common parent paths' { If ( (& $SafeCommands['Get-Variable'] -Name IsLinux -Scope Global -ErrorAction SilentlyContinue) -or (& $SafeCommands['Get-Variable'] -Name IsMacOS -Scope Global -ErrorAction SilentlyContinue)) { $paths = @( Normalize-Path '/usr/lib/Common\Folder\UniqueSubfolder1/File.ps1' Normalize-Path '/usr/lib/Common\Folder\UniqueSubfolder2/File2.ps1' Normalize-Path '/usr/lib/Common\Folder\UniqueSubfolder3/File3.ps1' $expectedCommonPath = Normalize-Path '/usr/lib/Common/Folder' ) } Else { $paths = @( Normalize-Path 'C:\Common\Folder\UniqueSubfolder1/File.ps1' Normalize-Path 'C:\Common\Folder\UniqueSubfolder2/File2.ps1' Normalize-Path 'C:\Common\Folder\UniqueSubfolder3/File3.ps1' $expectedCommonPath = Normalize-Path 'C:\Common/Folder' ) } $commonPath = Get-CommonParentPath -Path $paths It 'Identifies the correct parent path' { $commonPath | Should -Be $expectedCommonPath } $expectedRelativePath = Normalize-Path 'UniqueSubfolder1/File.ps1' $relativePath = Get-RelativePath -Path $paths[0] -RelativeTo $commonPath It 'Strips the common path correctly' { $relativePath | Should -Be $expectedRelativePath } } if ((Get-Module -ListAvailable PSDesiredStateConfiguration) -and $PSVersionTable.PSVersion.Major -ge 4 -and ((GetPesterOS) -eq 'Windows')) { Describe 'Analyzing coverage of a DSC configuration' { $root = (Get-PSDrive TestDrive).Root $null = New-Item -Path $root\TestScriptWithConfiguration.ps1 -ItemType File -ErrorAction SilentlyContinue Set-Content -Path $root\TestScriptWithConfiguration.ps1 -Value @' $line1 = $true $line2 = $true configuration MyTestConfig { Import-DscResource -ModuleName PSDesiredStateConfiguration Node localhost { WindowsFeature XPSViewer { Name = 'XPS-Viewer' Ensure = 'Present' } } return $doesNotExecute = $true } $line3 = $true return $doesnotexecute = $true '@ $testState = New-PesterState -Path $root Enter-CoverageAnalysis -CodeCoverage "$root\TestScriptWithConfiguration.ps1" -PesterState $testState $runsInPowerShell4 = $PSVersionTable.PSVersion.Major -eq 4 It 'Has the proper number of breakpoints defined' { if ($runsInPowerShell4) { $expected = 7 } else { $expected = 8 } $testState.CommandCoverage.Count | Should -Be $expected } $null = . "$root\TestScriptWithConfiguration.ps1" $coverageReport = Get-CoverageReport -PesterState $testState It 'Reports the proper number of missed commands before running the configuration' { if ($runsInPowerShell4) { $expected = 4 } else { $expected = 5 } $coverageReport.MissedCommands.Count | Should -Be $expected } MyTestConfig -OutputPath $root $coverageReport = Get-CoverageReport -PesterState $testState It 'Reports the proper number of missed commands after running the configuration' { if ($runsInPowerShell4) { $expected = 2 } else { $expected = 3 } $coverageReport.MissedCommands.Count | Should -Be $expected } Exit-CoverageAnalysis -PesterState $testState } } }
combined_dataset/train/non-malicious/3440.ps1
3440.ps1
[CmdletBinding()] Param( [Parameter(Mandatory=$False, Position=0)] [String]$Folder, [Parameter(Mandatory=$False)] [bool]$Major, [Parameter(Mandatory=$False)] [bool]$Minor, [Parameter(Mandatory=$False)] [bool]$Patch ) function ReplaceVersion([string]$key, [string]$line) { $matches = ([regex]::matches($line, "$key\s*=\s*['\""]([\d\.]+)['\""]")) if($matches.Count -eq 1) { $packageVersion = $matches.Groups[1].Value $version = $packageVersion.Split(".") $cMajor = $Major $cMinor = $Minor $cPatch = $Patch if ($version[0] -eq 0) { if ($cMajor -eq $true) { $version[1] = 1 + $version[1] $version[2] = "0" } if ($cMinor -eq $true -or $cPatch -eq $true) { $version[2] = 1 + $version[2] } } else { if ($cMajor -eq $true) { $version[0] = 1 + $version[0] $version[1] = "0" $version[2] = "0" } if ($cMinor -eq $true) { $version[1] = 1 + $version[1] $version[2] = "0" } if ($cPatch -eq $true) { $version[2] = 1 + $version[2] } } $version = [String]::Join(".", $version) $line -Replace "$key(\s*)=(\s*)(['\""])$packageVersion(['\""])", ($key + '${1}=${2}${3}' + $version + '$4') } else { $line } } function IncrementVersion([string]$FilePath) { Write-Output "Updating File: $FilePath" (Get-Content $FilePath) | ForEach-Object { $temp = ReplaceVersion "ModuleVersion" $_ ReplaceVersion "RequiredVersion" $temp } | Set-Content -Path $FilePath -Encoding UTF8 } if (!$Folder) { $Folder = "$PSScriptRoot\..\src" } $modules = Get-ChildItem -Path $Folder -Filter *.psd1 -Recurse -Exclude *.dll-help.psd1 ForEach ($module in $modules) { IncrementVersion($module.FullName) }
combined_dataset/train/non-malicious/sample_2_62.ps1
sample_2_62.ps1
<# .SYNOPSIS DEV Components and Scenarios module for learning and demoing TSS Framework usage. This is NOT related to any specific POD and not designed for learning and troubleshooting. .DESCRIPTION DEV Components and Scenarios module for learning and demoing TSS Framework usage. This is NOT related to any specific POD and not designed for learning and troubleshooting. .NOTES Dev. Lead: milanmil Authors : milanmil, waltere Requires : PowerShell V4(Supported from Windows 8.1/Windows Server 2012 R2) Version : see $global:TssVerDateDEV .LINK TSS https://internal.evergreen.microsoft.com/en-us/help/4619187 #> <# latest changes :: 2023.08.07.0 [mm] _ADS: move ADS_EESummit to DEV_EESummit :: 2023.01.23.0 [we] _DEV: added function DevTest :: 2022.12.07.0 [we] _DEV: add -Scenario DEV_General :: 2022.01.05.0 [we] added FW function calls which were previously defined in _NET :: 2021.11.10.0 [we] #_# replaced all 'Get-WmiObject' with 'Get-CimInstance' to be compatible with PowerShell v7 #> $global:TssVerDateDEV= "2023.08.17.0" #region --- ETW component trace Providers --- # Normal trace -> data will be collected in a single file $DEV_TEST1Providers = @( '{CC85922F-DB41-11D2-9244-006008269001}' # LSA '{6B510852-3583-4E2D-AFFE-A67F9F223438}' # Kerberos ) # Normal trace with multi etl files # Syntax is: GUID!filename!flags!level # GUID is mandtory # if filename is not provided TSS will create etl using Providers name, i.e. dev_test2 # if flags is not provided, TSS defaults to 0xffffffff # if level is not provided, TSS defaults to 0xff $DEV_TEST2Providers = @( '{98BF1CD3-583E-4926-95EE-A61BF3F46470}!CertCli!0xffffff!0x05' '{6A71D062-9AFE-4F35-AD08-52134F85DFB9}!CertificationAuthority!0xff!0x07' '{B40AEF77-892A-46F9-9109-438E399BB894}!CertCli!0xfffffe!0x04' '{169EC169-5B77-4A3E-9DB6-441799D5CACB}!lsa!0xfffffffe' '{5BBB6C18-AA45-49B1-A15F-085F7ED0AA90}!CertificationAuthority!0xC43EFF!0x06' '{D0B639E0-E650-4D1D-8F39-1580ADE72784}!lsa!0xffffffff!0x0f' ) # Single etl + multi flags $DEV_TEST3Providers = @( '{D0B639E0-E650-4D1D-8F39-1580ADE72784}!lsa!0xC43EFF' '{169EC169-5B77-4A3E-9DB6-441799D5CACB}!lsa!0xffffff' ) $DEV_TEST4Providers = @( '{D0B639E0-E650-4D1D-8F39-1580ADE72784}!lsa!0xC43EFF' '{169EC169-5B77-4A3E-9DB6-441799D5CACB}!lsa!0xffffff' '{D0B639E0-E650-4D1D-8F39-1580ADE72784}!lsa!0xffffffff!0x0f' '{5BBB6C18-AA45-49B1-A15F-085F7ED0AA90}!CertificationAuthority!0xC43EFF!0x06' ) $DEV_EESummitDemoProviders = @( '{CA030134-54CD-4130-9177-DAE76A3C5791}!netlogon' # NETLOGON/ NETLIB '{E5BA83F6-07D0-46B1-8BC7-7E669A1D31DC}!netlogon' # Microsoft-Windows-Security-Netlogon '{8EE3A3BF-9379-4DAC-B376-038F498B19A4}!w32time' # Microsoft.Windows.W32Time ) #select basic or full tracing option for the same etl guids using different flags if ($global:CustomParams){ Switch ($global:CustomParams[0]){ "full" {$DEV_TEST5Providers = @( '{D0B639E0-E650-4D1D-8F39-1580ADE72784}!lsa!0xffffffff' '{169EC169-5B77-4A3E-9DB6-441799D5CACB}!lsa!0xffffffff' ) } "basic" {$DEV_TEST5Providers = @( '{D0B639E0-E650-4D1D-8F39-1580ADE72784}!lsa!0xC43EFF' '{169EC169-5B77-4A3E-9DB6-441799D5CACB}!lsa!0xffffff' ) } Default {$DEV_TEST5Providers = @( '{D0B639E0-E650-4D1D-8F39-1580ADE72784}!lsa!0xC43EFF' '{169EC169-5B77-4A3E-9DB6-441799D5CACB}!lsa!0xfffff!0x12' ) } } } #endregion --- ETW component trace Providers --- #region --- Scenario definitions --- $DEV_General_ETWTracingSwitchesStatus = [Ordered]@{ #'NET_Dummy' = $true 'CommonTask NET' = $True ## <------ the commontask can take one of "Dev", "NET", "ADS", "UEX", "DnD" and "SHA", or "Full" or "Mini" 'NetshScenario InternetClient_dbg' = $true 'Procmon' = $true #'WPR General' = $true 'PerfMon ALL' = $true 'PSR' = $true 'Video' = $true 'SDP NET' = $True 'xray' = $True 'CollectComponentLog' = $True } $DEV_ScenarioTraceList = [Ordered]@{ 'DEV_Scn1' = 'DEV scenario trace 1' 'DEV_Scn2' = 'DEV scenario trace 2' "DEV_EESummitDemo" = "DEV_EESummitDemo Trace, ADS_Kerb, PSR, Netsh" } # DEV_Scn1 $DEV_Scn1_ETWTracingSwitchesStatus = [Ordered]@{ 'DEV_TEST1' = $true #'DEV_TEST2' = $true # Multi etl file trace #'DEV_TEST3' = $true # Single trace #'DEV_TEST4' = $true #'DEV_TEST5' = $true #'Netsh' = $true #'Netsh capturetype=both captureMultilayer=yes provider=Microsoft-Windows-PrimaryNetworkIcon provider={1701C7DC-045C-45C0-8CD6-4D42E3BBF387}' = $true #'NetshMaxSize 4096' = $true #'Procmon' = $true #'ProcmonFilter ProcmonConfiguration.pmc' = $True #'ProcmonPath C:\tools' = $True #'WPR memory' = $true #'WPR memory -onoffproblemdescription "test description"' = $true #'skippdbgen' = $true #'PerfMon smb' = $true #'PerfIntervalSec 20' = $true #'PerfMonlong general' = $true #'PerfLongIntervalMin 40' = $true #'NetshScenario InternetClient_dbg' = $true #'NetshScenario InternetClient_dbg,dns_wpp' = $true #'NetshScenario InternetClient_dbg,dns_wpp capturetype=both captureMultilayer=yes provider=Microsoft-Windows-PrimaryNetworkIcon provider={1701C7DC-045C-45C0-8CD6-4D42E3BBF387}' = $true #'PSR' = $true #'WFPdiag' = $true #'RASdiag' = $true #'PktMon' = $true #'AddDescription' = $true #'SDP rds' = $True #'SDP setup,perf' = $True #'SkipSDPList noNetadapters,skipBPA' = $True #'xray' = $True #'Video' = $True #'SysMon' = $True #'CommonTask Mini' = $True #'CommonTask Full' = $True #'CommonTask Dev' = $True #'noBasicLog' = $True #'noPSR' = $True #'noVideo' = $True #'Mini' = $True #'NoSettingList noSDP,noXray,noBasiclog,noVideo,noPSR' = $True #'Xperf Pool' = $True #'XPerfMaxFile 4096' = $True #'XperfTag TcpE+AleE+AfdE+AfdX' = $True #'XperfPIDs 100' = $True #'LiveKD Both' = $True #'WireShark' = $True #'TTD notepad.exe' = $True # Single process [<processname.exe>|<PID>] #'TTD notepad.exe,cmd.exe' = $True # Multiple processes #'TTD tokenbroker' = $True # Service name #'TTD Microsoft.Windows.Photos' = $True # AppX #"TTDPath $env:userprofile\Desktop\PartnerTTDRecorder_x86_x64\amd64\TTD" = $True # for downlevel OS TTD will find Partner tttracer in \Bin** folder #'TTDMode Ring' = $True # choose [Full|Ring|onLaunch] #'TTDMaxFile 2048' = $True #'TTDOptions XXX' = $True #'CollectComponentLog' = $True #'Discard' = $True #'ProcDump notepad.exe,mspaint.exe,tokenbroker' = $true #'ProcDumpOption Both' = $true #'ProcDumpInterval 3:10' = $True #'GPResult Both' = $True #'PoolMon Both' = $True #'Handle Both' = $True } # DEV_Scn2 Switch (global:FwGetProductTypeFromReg){ "WinNT" { $DEV_Scn2_ETWTracingSwitchesStatus = [Ordered]@{ 'DEV_TEST1' = $true 'DEV_TEST2' = $true # Multi etl file trace 'DEV_TEST3' = $true 'DEV_TEST4' = $true # Single trace 'DEV_TEST5' = $False # Disabled trace 'UEX_Task' = $True # Outside of this module } } "ServerNT" { $DEV_Scn2_ETWTracingSwitchesStatus = [Ordered]@{ 'DEV_TEST1' = $true 'DEV_TEST2' = $true } } "LanmanNT" { $DEV_Scn2_ETWTracingSwitchesStatus = [Ordered]@{ 'DEV_TEST1' = $true 'DEV_TEST2' = $true } } Default { $DEV_Scn2_ETWTracingSwitchesStatus = [Ordered]@{ 'DEV_TEST1' = $true 'DEV_TEST2' = $true } } } # Dev_Scn3 => Multi etl only $DEV_Scn3_ETWTracingSwitchesStatus = [Ordered]@{ 'DEV_TEST2' = $true # Multi etl file trace } $DEV_EESummitDemo_ETWTracingSwitchesStatus = [Ordered]@{ 'DEV_EESummitDemo' = $true 'ADS_Kerb' = $true 'Netsh' = $true 'PSR' = $true 'xray' = $true 'noBasicLog' = $true 'CollectComponentLog' = $True } #endregion --- Scenario definitions --- #region Functions #region Components Functions #region -------------- DevTest ----------- # IMPORTANT: this trace should be used only for development and testing purposes function DevTestPreStart{ EnterFunc $MyInvocation.MyCommand.Name LogInfoFile "[$($MyInvocation.MyCommand.Name)] .. started" global:FwCollect_BasicLog #### Various EVENT LOG actions *** # A simple way for exporting EventLogs in .evtx and .txt format is done by function FwAddEvtLog ($EvtLogsLAPS array is defined at bottom of this file) # Ex: ($EvtLogsLAPS) | ForEach-Object { FwAddEvtLog $_ _Stop_} #Event Log - Set Log - Enable $EventLogSetLogListOn = New-Object 'System.Collections.Generic.List[Object]' $EventLogSetLogListOn = @( #LogName, enabled, retention, quiet, MaxSize @("Microsoft-Windows-CAPI2/Operational", "true", "false", "true", "102400000"), @("Microsoft-Windows-Kerberos/Operational", "true", "", "", "") ) ForEach ($EventLog in $EventLogSetLogListOn) { global:FwEventLogsSet $EventLog[0] $EventLog[1] $EventLog[2] $EventLog[3] $EventLog[4] } #Event Log - Export Log $EventLogExportLogList = New-Object 'System.Collections.Generic.List[Object]' $EventLogExportLogList = @( #LogName, filename, overwrite @("Microsoft-Windows-CAPI2/Operational", "c:\dev\Capi2_Oper.evtx", "true"), @("Microsoft-Windows-Kerberos/Operational", "c:\dev\Kerberos_Oper.evtx", "true") ) ForEach ($EventLog in $EventLogExportLogList) { global:FwExportSingleEventLog $EventLog[0] $EventLog[1] $EventLog[2] } #Event Log - Set Log - Disable $EventLogSetLogListOff = New-Object 'System.Collections.Generic.List[Object]' $EventLogSetLogListOff = @( #LogName, enabled, retention, quiet, MaxSize @("Microsoft-Windows-CAPI2/Operational", "false", "", "", ""), @("Microsoft-Windows-Kerberos/Operational", "false", "", "", "") ) ForEach ($EventLog in $EventLogSetLogListOff) { global:FwEventLogsSet $EventLog[0] $EventLog[1] $EventLog[2] $EventLog[3] $EventLog[4] } #Event Log - Clear Log $EventLogClearLogList = New-Object 'System.Collections.Generic.List[Object]' $EventLogClearLogList = @( #LogName, enabled, retention, quiet, MaxSize @("Microsoft-Windows-CAPI2/Operational"), @("Microsoft-Windows-Kerberos/Operational") ) ForEach ($EventLog in $EventLogClearLogList) { global:FwEventLogClear $EventLog[0] } #### Various REGISTRY manipulaiton functions *** # A simple way for exporting Regisgtry keys is done by function FwAddRegItem with a registry array defined at bottom of this file ($global:KeysWinLAPS) # Ex.: FwAddRegItem @("WinLAPS") _Stop_ # RegAddValues $RegAddValues = New-Object 'System.Collections.Generic.List[Object]' $RegAddValues = @( #RegKey, RegValue, Type, Data @("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\My Key", "my test1", "REG_DWORD", "0x1"), @("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\My Key", "my test2", "REG_DWORD", "0x2") ) ForEach ($regadd in $RegAddValues) { global:FwAddRegValue $regadd[0] $regadd[1] $regadd[2] $regadd[3] } # RegExport in TXT LogInfo "[$global:TssPhase ADS Stage:] Exporting Reg.keys .. " "gray" $RegExportKeyInTxt = New-Object 'System.Collections.Generic.List[Object]' $RegExportKeyInTxt = @( #Key, ExportFile, Format (TXT or REG) @("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\My Key", "C:\Dev\regtestexportTXT1.txt", "TXT"), @("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL", "C:\Dev\regtestexportTXT2.txt", "TXT") ) ForEach ($regtxtexport in $RegExportKeyInTxt) { global:FwExportRegKey $regtxtexport[0] $regtxtexport[1] $regtxtexport[2] } # RegExport in REG $RegExportKeyInReg = New-Object 'System.Collections.Generic.List[Object]' $RegExportKeyInReg = @( #Key, ExportFile, Format (TXT or REG) @("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\My Key", "C:\Dev\regtestexportREG1.reg", "REG"), @("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL", "C:\Dev\regtestexportREG2.reg", "REG") ) ForEach ($regregexport in $RegExportKeyInReg) { global:FwExportRegKey $regregexport[0] $regregexport[1] $regregexport[2] } # RegDeleteValues $RegDeleteValues = New-Object 'System.Collections.Generic.List[Object]' $RegDeleteValues = @( #RegKey, RegValue @("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\My Key", "my test1"), @("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\My Key", "my test2") ) ForEach ($regdel in $RegDeleteValues) { global:FwDeleteRegValue $regdel[0] $regdel[1] } #### FILE COPY Operations *** # Create Dest. Folder FwCreateFolder $global:LogFolder\Files_test2 $SourceDestinationPaths = New-Object 'System.Collections.Generic.List[Object]' $SourceDestinationPaths = @( #source (* wildcard is supported) and destination @("C:\Dev\my folder\test*", "$global:LogFolder\Files_test2"), #this will copy all files that match * criteria into dest folder @("C:\Dev\my folder\test1.txt", "$global:LogFolder\Files_test2") #this will copy test1.txt to destination file name and add logprefix ) global:FwCopyFiles $SourceDestinationPaths EndFunc $MyInvocation.MyCommand.Name } function DevTestPostStop{ EnterFunc $MyInvocation.MyCommand.Name LogInfoFile "[$($MyInvocation.MyCommand.Name)] .. started" EndFunc $MyInvocation.MyCommand.Name } #endregion -------------- DevTest ----------- ### Pre-Start / Post-Stop / Collect / Diag function for Components tracing ##### Pre-Start / Post-Stop function for trace function DEV_TEST1PreStart{ EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." # Testing FwSetEventLog #FwSetEventLog "Microsoft-Windows-CAPI2/Operational" -EvtxLogSize:100000 -ClearLog #FwSetEventLog 'Microsoft-Windows-CAPI2/Catalog Database Debug' -EvtxLogSize:102400000 #$PowerShellEvtLogs = @("Microsoft-Windows-PowerShell/Admin", "Microsoft-Windows-PowerShell/Operational") #FwSetEventLog $PowerShellEvtLogs EndFunc $MyInvocation.MyCommand.Name } function DEV_TEST1PostStart{ EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } function DEV_TEST1PreStop{ EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." #LogWarn "** Will do Forced Crash now" cyan #FwDoCrash EndFunc $MyInvocation.MyCommand.Name } function DEV_TEST1PostStop{ EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." # Testing FwResetEventLog #FwResetEventLog 'Microsoft-Windows-CAPI2/Operational' #FWResetEventLog 'Microsoft-Windows-CAPI2/Catalog Database Debug' #$PowerShellEvtLogs = @("Microsoft-Windows-PowerShell/Admin", "Microsoft-Windows-PowerShell/Operational") #FwResetEventLog $PowerShellEvtLogs EndFunc $MyInvocation.MyCommand.Name } function DEV_TEST2PreStart{ EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } function DEV_TEST2PostStop{ EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } function DEV_TEST3PreStart{ EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } function DEV_TEST3PostStop{ EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." <# $SourceDestinationPaths = New-Object 'System.Collections.Generic.List[Object]' $SourceDestinationPaths = @( @("$env:ProgramData\Microsoft\WlanSvc\*", "$global:LogFolder\files_ProgramData_WlanSvc"), @("C:\Subst_E\test2\2_SDP_RFL", "$global:LogFolder"), @("C:\Subst_E\test1\SDP_RFL", "$global:LogFolder\SDP_RFL"), @("C:\Subst_E\test2\2_SDP_RFL\*", "$global:LogFolder\SDP_RFL2") ) FwCopyFolders $SourceDestinationPaths -ShowMessage:$True #> #FwCreateFolder $global:LogFolder\Test2 $SourceDestinationPaths = New-Object 'System.Collections.Generic.List[Object]' $SourceDestinationPaths = @( @("C:\Subst_E\folder-missing\*", "$global:LogFolder\folder-missing\"), @("C:\Subst_E\test1\file-missing.txt", "$global:LogFolder\file-missing\"), @("C:\Subst_E\test1\SDP_RFL\*", "$global:LogFolder\test1-SDP-RFL"), #<== don't forget the comma when having multi-line arrays! @("C:\Subst_E\test2\2_SDP_RFL\Win10*.txt", "$global:LogFolder\Test2\"), @("C:\Subst_E\test3\SDP_RFL\WIN10-22H2_230630-181531__Log-transcript.txt", "$global:LogFolder\Test3\my-new.txt") ) FwCopyFiles $SourceDestinationPaths -ShowMessage:$True EndFunc $MyInvocation.MyCommand.Name } ##### Data Collection function CollectDEV_TEST1Log{ EnterFunc $MyInvocation.MyCommand.Name $LogPrefix = "Dev_TEST1" $LogFolderforDEV_TEST1 = "$Logfolder\Dev_TEST1" FwCreateFolder $LogFolderforDEV_TEST1 <# <#--- Log functions ---#> #LogDebug "This is message from LogDebug." #LogInfo "This is message from LogInfo." #LogWarn "This is message from LogWarn." #LogError "This is message from LogError." #Try{ # Throw "Test exception" #}Catch{ # LogException "This is message from LogException" $_ #} #LogInfoFile "This is message from LogInfoFile." #LogWarnFile "This is message from LogWarnFile." #LogErrorFile "This is message from LogErrorFile." <#--- Test ExportEventLog and FwExportEventLogWithTXTFormat ---#> #FwExportEventLog 'System' $LogFolderforDEV_TEST1 #ExportEventLog "Microsoft-Windows-DNS-Client/Operational" $LogFolderforDEV_TEST1 #FwExportEventLogWithTXTFormat 'System' $LogFolderforDEV_TEST1 <#--- FwSetEventLog and FwResetEventLog ---#> #$EventLogs = @( # 'Microsoft-Windows-WMI-Activity/Trace' # 'Microsoft-Windows-WMI-Activity/Debug' #) #FwSetEventLog $EventLogs #Start-Sleep 20 #FwResetEventLog $EventLogs <#--- FwAddEvtLog and FwGetEvtLogList ---#> #($EvtLogsBluetooth) | ForEach-Object { FwAddEvtLog $_ _Stop_} # see #region groups of Eventlogs for FwAddEvtLog #_# Note: FwGetEvtLogList should be called in _Start_Common_Tasks and _Start_Common_Tasks POD functions, otherwise it is called in FW FwCollect_BasicLog/FwCollect_MiniBasicLog functions <#--- FwAddRegItem and FwGetRegList ---#> #FwAddRegItem @("SNMP", "Tcp") _Stop_ # see #region Registry Key modules for FwAddRegItem #_# Note: FwGetRegList should be called in _Start_Common_Tasks and _Start_Common_Tasks POD functions, otherwise it is called in FW FwCollect_BasicLog/FwCollect_MiniBasicLog functions <#--- Test RunCommands --#> #$outFile = "$LogFolderforDEV_TEST1\netinfo.txt" #$Commands = @( # "IPCONFIG /ALL | Out-File -Append $outFile" # "netsh interface IP show config | Out-File -Append $outFile" #) #RunCommands "$LogPrefix" $Commands -ThrowException:$False -ShowMessage:$True <#--- FwCopyFiles ---#> # Case 1: Copy a single set of files #$SourceDestinationPaths = New-Object 'System.Collections.Generic.List[Object]' #$SourceDestinationPaths.add(@("C:\Temp\*", "$LogFolderforDEV_TEST1")) #FwCopyFiles $SourceDestinationPaths # Case 2: Copy a single file #$SourceDestinationPaths = New-Object 'System.Collections.Generic.List[Object]' #$SourceDestinationPaths.add(@("C:\temp\test-case2.txt", "$LogFolderforDEV_TEST1")) #FwCopyFiles $SourceDestinationPaths # Case 3: Copy multi sets of files #$SourceDestinationPaths = New-Object 'System.Collections.Generic.List[Object]' #$SourceDestinationPaths = @( # @("C:\temp\*", "$LogFolderforDEV_TEST1"), # @("C:\temp2\test-case3.txt", "$LogFolderforDEV_TEST1") #) #FwCopyFiles $SourceDestinationPaths <#--- FwExportRegistry and FwExportRegToOneFile ---#> #LogInfo '[$LogPrefix] testing FwExportRegistry().' #$RecoveryKeys = @( # ('HKLM:System\CurrentControlSet\Control\CrashControl', "$LogFolderforDEV_TEST1\Basic_Registry_CrashControl.txt"), # ('HKLM:System\CurrentControlSet\Control\Session Manager\Memory Management', "$LogFolderforDEV_TEST1\Basic_Registry_MemoryManagement.txt"), # ('HKLM:Software\Microsoft\Windows NT\CurrentVersion\AeDebug', "$LogFolderforDEV_TEST1\Basic_Registry_AeDebug.txt"), # ('HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Option', "$LogFolderforDEV_TEST1\Basic_Registry_ImageFileExecutionOption.txt"), # ('HKLM:System\CurrentControlSet\Control\Session Manager\Power', "$LogFolderforDEV_TEST1\Basic_Registry_Power.txt") #) #FwExportRegistry $LogPrefix $RecoveryKeys # #$StartupKeys = @( # "HKCU:Software\Microsoft\Windows\CurrentVersion\Run", # "HKCU:Software\Microsoft\Windows\CurrentVersion\Runonce", # "HKCU:Software\Microsoft\Windows\CurrentVersion\RunonceEx" #) #FwExportRegToOneFile $LogPrefix $StartupKeys "$LogFolderforDEV_TEST1\Basic_Registry_RunOnce_reg.txt" <#---FwCaptureUserDump ---#> # Service #FwCaptureUserDump -Name "Winmgmt" -DumpFolder $LogFolderforDEV_TEST1 -IsService:$True # Process #FwCaptureUserDump -Name "notepad" -DumpFolder $LogFolderforDEV_TEST1 # PID #FwCaptureUserDump -ProcPID 4524 -DumpFolder $LogFolderforDEV_TEST1 <#---general collect functions - often used in _Start/Stop_common_tasks---#> #FwClearCaches _Start_ #FwCopyWindirTracing IPhlpSvc #FwDoCrash #FwGetCertsInfo _Stop_ Basic #FwGetEnv #FwGetGPresultAS #FwGetKlist #FwGetMsInfo32 #FwGetNltestDomInfo #FwGetPoolmon #FwGetProxyInfo #FwGetQwinsta #FwGetRegHives #FwRestartInOwnSvc WebClient #FwGetSVC #FwGetSVCactive #FwGetSysInfo #FwGetTaskList #FwGetWhoAmI #FwTest-TCPport -ComputerName "cesdiagtools.blob.core.windows.net" -Port 80 -Timeout 900 EndFunc $MyInvocation.MyCommand.Name } function CollectDEV_TEST2Log { EnterFunc $MyInvocation.MyCommand.Name LogInfo "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } ##### Diag function function RunDEV_TEST1Diag { EnterFunc $MyInvocation.MyCommand.Name If($global:BoundParameters.containskey('InputlogPath')){ $diagpath = $global:BoundParameters['InputlogPath'] LogInfo "diagpath = $diagpath" } LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } <# function RunDEV_TEST2Diag { EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } #> #endregion Components Functions #region Scenario Functions ### Pre-Start / Post-Stop / Collect / Diag function for scenario tracing ##### Common tasks function DEV_Start_Common_Tasks{ EnterFunc $MyInvocation.MyCommand.Name LogInfo "$($MyInvocation.MyCommand.Name) is called." #FwGetRegList _Start_ #FwGetEvtLogList _Start_ EndFunc $MyInvocation.MyCommand.Name } function DEV_Stop_Common_Tasks{ EnterFunc $MyInvocation.MyCommand.Name LogInfo "$($MyInvocation.MyCommand.Name) is called." #FwGetRegList _Stop_ #FwGetEvtLogList _Stop_ EndFunc $MyInvocation.MyCommand.Name } ##### DEV_Scn1 function DEV_Scn1ScenarioPreStart { EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } function DEV_Scn1ScenarioPostStart { EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } function DEV_Scn1ScenarioPreStop { EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } function DEV_Scn1ScenarioPostStop { EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } function CollectDEV_Scn1ScenarioLog { EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } function RunDEV_Scn1ScenarioDiag { EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } ##### DEV_Scn2 function DEV_Scn2ScenarioPreStart { EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } function DEV_Scn2ScenarioPostStop { EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } function CollectDEV_Scn2ScenarioLog { EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } <# function RunDEV_Scn2ScenarioDiag { EnterFunc $MyInvocation.MyCommand.Name LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called." EndFunc $MyInvocation.MyCommand.Name } #> #region DEV_EESummitDemo function DEV_EESummitDemoPreStart { EnterFunc $MyInvocation.MyCommand.Name LogInfo "[$($MyInvocation.MyCommand.Name)] .. Enabling Netlogon service debug log" FwAddRegValue "HKLM\System\CurrentControlSet\Services\Netlogon\Parameters" "DbFlag" "REG_DWORD" "$global:NetLogonFlag" EndFunc $MyInvocation.MyCommand.Name } function DEV_EESummitDemoPostStop { EnterFunc $MyInvocation.MyCommand.Name LogInfo "[$($MyInvocation.MyCommand.Name)] .. Disabling Netlogon service debug log" FwAddRegValue "HKLM\System\CurrentControlSet\Services\Netlogon\Parameters" "DbFlag" "REG_DWORD" "0x0" EndFunc $MyInvocation.MyCommand.Name } function CollectDEV_EESummitDemoLog { EnterFunc $MyInvocation.MyCommand.Name LogInfo "[$($MyInvocation.MyCommand.Name)] Collecting DEV_EESummitDemo logs started." # init variables $ComputerSystem = Get-WmiObject -Namespace "root\CIMv2" -Class Win32_ComputerSystem if (!([string]::IsNullOrEmpty($ComputerSystem))) { #$ComputerDomain = $ComputerSystem.Domain $DomainRole = $ComputerSystem.DomainRole } else { #$ComputerDomain = "WORKGROUP" $DomainRole = 0 } $RootDSE = [ADSI]"LDAP://RootDSE" $DefaultNamingContext = $RootDSE.defaultNamingContext if ($Null -ne $DefaultNamingContext) { $ConfigurationNamingContext = $RootDSE.configurationNamingContext $DCAccessible = $True } else { $DCAccessible = $False } #setting commands to execute if (($DomainRole -eq 1) -Or ($DomainRole -eq 3) -Or ($DomainRole -eq 4) -Or ($DomainRole -eq 5)) { # Member Workstation, Member Server, BDC, or PDC if ($DCAccessible -eq $True) { $Commands = @( "nltest /dclist: | Out-File -Append $($PrefixTime)nltest_dclist.txt" "nltest /dsgetsite | Out-File -Append $($PrefixTime)nltest_dsgetsite.txt" "nltest /domain_trusts /all_trusts /v | Out-File -Append $($PrefixTime)nltest_domain_trusts_all_trusts_v.txt" "nltest /trusted_domains | Out-File -Append $($PrefixTime)nltest_trusted_domains.txt" "w32tm /query /status /verbose | Out-File -Append $($PrefixTime)w32tm_query_status.txt" "w32tm /query /configuration | Out-File -Append $($PrefixTime)w32tm_query_config.txt" "w32tm /query /peers /verbose | Out-File -Append $($PrefixTime)w32tm_query_peers.txt" ) } else { #do nothing } } # executing commands: RunCommands $LogPrefix $Commands -ThrowException:$False -ShowMessage:$False # FW conveniance function for GPO relevant data FwGetGPresultAS # files to copy: source , destination $SourceDestinationPaths = @( @("$Env:SYSTEMROOT\debug\dcpromo.log", "$($PrefixTime)dcpromo.log"), @("$Env:SYSTEMROOT\debug\dcpromoui.log", "$($PrefixTime)dcpromoui.log"), @("$Env:SYSTEMROOT\debug\netlogon.log", "$($PrefixTime)netlogon.log"), @("$Env:SYSTEMROOT\debug\netsetup.log", "$($PrefixTime)netsetup.log") ) # copying files FwCopyFiles $SourceDestinationPaths # export registry $global:KeysEESummitDemo = @( "HKLM:System\CurrentControlSet\Services\W32Time" "HKLM:Software\Policies\Microsoft\W32Time" "HKLM:System\CurrentControlSet\Services\Netlogon\Parameters" "HKLM:Software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{D76B9641-3288-4f75-942D-087DE603E3EA}" ) FwAddRegItem @("EESummitDemo") _Stop_ #export event logs $EvtEESummitDemo = @("Application", "System", "Directory Service") ($EvtEESummitDemo) | ForEach-Object { FwAddEvtLog $_ _Stop_} LogInfo "[$($MyInvocation.MyCommand.Name)] Collecting DEV_EESummit logs ended." EndFunc $MyInvocation.MyCommand.Name } function CollectDEV_EESummitDemoScenarioLog{ LogInfo "[$($MyInvocation.MyCommand.Name)] Collecting DEV_EESummitDemoScenario logs started." CollectDEV_EESummitDemoLog } #endregion DEV_EESummitDemo #endregion Scenario Functions #endregion Functions #region Registry Key modules for FwAddRegItem <# $global:KeysSNMP = @("HKLM:System\CurrentControlSet\Services\SNMP", "HKLM:System\CurrentControlSet\Services\SNMPTRAP") $global:KeysWinLAPS = @( "HKLM:Software\Microsoft\Policies\LAPS" "HKLM:Software\Microsoft\Windows\CurrentVersion\Policies\LAPS" "HKLM:Software\Policies\Microsoft Services\AdmPwd" "HKLM:Software\Microsoft\Windows\CurrentVersion\LAPS\Config" "HKLM:Software\Microsoft\Windows\CurrentVersion\LAPS\State" "HKLM:Software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{D76B9641-3288-4f75-942D-087DE603E3EA}" ) #> <# Example: $global:KeysHyperV = @("HKLM:Software\Microsoft\Windows NT\CurrentVersion\Virtualization", "HKLM:System\CurrentControlSet\Services\vmsmp\Parameters") #> # B) section of NON-recursive lists <# $global:KeysDotNETFramework = @( "HKLM:Software\Microsoft\.NETFramework\v2.0.50727" "HKLM:Software\Wow6432Node\Microsoft\.NETFramework\v2.0.50727" "HKLM:Software\Microsoft\.NETFramework\v4.0.30319" "HKLM:Software\Wow6432Node\Microsoft\.NETFramework\v4.0.30319" ) #> #endregion Registry Key modules #endregion Registry Key modules #region groups of Eventlogs for FwAddEvtLog <# $EvtLogsBluetooth = @("Microsoft-Windows-Bluetooth-BthLEPrepairing/Operational", "Microsoft-Windows-Bluetooth-MTPEnum/Operational") # $EvtLogsLAPS = @("Microsoft-Windows-LAPS-Operational", "Microsoft-Windows-LAPS/Operational") <# Example: $global:EvtLogsEFS = @("Microsoft-Windows-NTFS/Operational", "Microsoft-Windows-NTFS/WHC") #> #endregion groups of Eventlogs # Deprecated parameter list. Property array of deprecated/obsoleted params. # DeprecatedParam: Parameters to be renamed or obsoleted in the future # Type : Can take either 'Rename' or 'Obsolete' # NewParam : Provide new parameter name for replacement only when Type=Rename. In case of Type='Obsolete', put null for the value. $DEV_DeprecatedParamList = @( <# @{DeprecatedParam='DEV_kernel';Type='Rename';NewParam='WIN_kernel'} # @{DeprecatedParam='DEV_SAM';Type='Rename';NewParam='DEV_SAMsrv'} # <-- this currently fails @{DeprecatedParam='DEV_EEsummitDemo';Type='Rename';NewParam='DEV_EEsummitDemo'} #> ) Export-ModuleMember -Function * -Cmdlet * -Variable * -Alias * # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCMmVHHsIA2ii6u # GDXO3Plyn8H5L3n1LVa9MPEzey4MZqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICRg6A5+sa4uyZ/QTkpu/eaW # 6pSVMBBIW1wdF0BfhBGVMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAAoB4zn4ESJ/Ax6+i/b0nTPllaUyIK0BwGM0Te4Qe6hczZcmSWerKNF/G # 9r/ORylPZNoL2n8T4nsRQ5p7F6zrjwTJa+WwQImgXJPQS+M6J6DXsHtyyGpKFW+3 # D42je+Uxm0mbNK4BeWSY/DbP5SatGFCzUvTwNpToecvKs3bXV16zFxRpx4VX7rgY # YNwSlZDt4ZklAfYBhmIHSpfIA1/OajMkYvUrSckVQTfSk+zNnneRtbCmtMi99tgD # +ynhLGQ6nyDWHL53RpzEo14/rQXoUPs8MW4SNppEeTtzeHB3C0wsOGCEstqCL1fg # yLOsZM1s6H6woNyyTNRzMfRgSkxFhqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCByr2PcyJlu9O/rlRSHR5hHhWlNn/7X6c/yB0lxMGNqigIGZwfUrV1O # GBMyMDI0MTAxNzAwMjAxOS40NzNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6ro7mzAiGA8yMDI0MTAxNjEzMTgx # OVoYDzIwMjQxMDE3MTMxODE5WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqujub # AgEAMAcCAQACAgduMAcCAQACAhMPMAoCBQDqu40bAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAD3sAuWFoa80QgFkwolRBquSkSlUo3DI1vTHocet9vldHIPN # +GMEX1lNQHG3VAMQbVYjcUSiT2DvHZpfmNev0EZTKCVRxZim+qsNArBi6hYmScEy # pFpwQcvsmJdy5yU1/l5JyCyv2QKhwikQyVKfMeUmQJ2FieX9T8MrGMPtWWY976RH # 82thiYvhYOppOSyRw1Gnpthx9e+lheNXHC6rJUU5BUB11dxQYMPtx7xXfC87xrWH # 9Q2q6bcXVARP8CA6BJe+jW9yG8ah5bmuPyK/ZfH+rjr74nsp3kCD/dSivBfjVfBK # Ocq63V7+MqZmxwUZuEX9Qqm9w6DUvVtHHPKKk8YxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCBsDkXW6sBy1vmtIOdebzyrerDTkq9NWO5TUsz8hvDCATCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+RAh8 # 41sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQgRO9YYA4+pGApd+c5N6lpA2xfI4Ds # gxbabE86Hld2ZnkwDQYJKoZIhvcNAQELBQAEggIA5k07cG4nv0RPo7rDFk7IlAXK # P3YmIQf59p8VhE2U5pHLCi8x4/BaM8SSlrkODPHXLGLqMsCB8CxJgCqxuG2XOQBw # s5B4M3u38NbnmuqirebDs8a2uQ0rmliieUKZGtz0vHfelWDYaPzr3SRa+cXhPnn9 # clWpbaKPZtG9fZiJtkZBuMcu6PtFh4+OMdkPKbjdDxqj3nQnit8LJXPRHBin+FKJ # w7CphUq6GgbHN/IUAnbMafTpEdVn80PW/NEQp38+Hj9Uj3h05lhKrV2ZfbN+8VpR # eXdDSWH+9cRbg7U1i3Hxd8clRr5BW6PPa1f2v+tgB3vMXp39A9lzGUrWcO1mkWnV # X+k7RIy3YL9T4Q/GuTpm+JIEDMPw33jI5XRdvJ0h+EpskAO839N5ky6UvBuYFjDT # 2irmeFz+Dc6xhXxXSyMZBjOTs1qWnk9oywy85c0IPgzbbu3rgEw1urr2TL7E7ut6 # vRX7OCjHGSBZIfOnWy+8NJZToe6qh4juAbEB/ByIkU1Y3EVNGL0zxHiIPp1vZqVF # tM2RvD+t60iyP6/VbkWgDD6/nAptqHcZs5Sok0batiXrBwKiH5ptQge9zVxd8tOk # 5q1UwrEfmH7sc+1LeaVGrlygz28Yg02GtybvxNUDP86+DtxswYQElGCfjshQXMe+ # h2rrsB5PnAbcG2YrUT8= # SIG # End signature block
combined_dataset/train/non-malicious/3335.ps1
3335.ps1
function Get-CommandStatus { [PoshBot.BotCommand( Aliases = ('getcommandstatus', 'commandstatus') )] [cmdletbinding()] param( [parameter(Mandatory)] $Bot ) $activeJobs = @($Bot.Executor._jobTracker.GetEnumerator() | Foreach-Object { $userId = $_.Value.ParsedCommand.From $userName = $Bot.RoleManager.ResolveUserIdToUserName($_.Value.ParsedCommand.From) $cmdDuration = [system.math]::Round(((Get-Date).ToUniversalTime() - $_.Value.Started.ToUniversalTime()).TotalSeconds, 0) [pscustomobject]@{ Id = $_.Value.Id From = "$userName [$userId]" CommandString = $_.Value.ParsedCommand.CommandString Complete = $_.Value.Complete Started = $_.Value.Started.ToUniversalTime().ToString('u') RunningTime = "$cmdDuration seconds" } }) if ($activeJobs.Count -eq 0) { New-PoshbotTextResponse -Text 'There are no active jobs' } else { $msg = ($activeJobs | Format-List -Property * | Out-String) New-PoshBotTextResponse -Text $msg -AsCode } }
combined_dataset/train/non-malicious/LibraryChart_2.ps1
LibraryChart_2.ps1
# --------------------------------------------------------------------------- ### <Script> ### <Author> ### Chad Miller ### </Author> ### <Description> ### Defines functions for wokring with Microsoft Chart Control for .NET 3.5 Framework ### Pipe output of Powershell command to Out-Chart function and specify chart type ### Chart will display in form or save to image file ### Real-time charts are supported by passing in a script block ### My thanks to Richard MacDonald for his wonderful post on Charting with PowerShell ### http://blogs.technet.com/richard_macdonald/archive/2009/04/28/3231887.aspx ### Note: Requires NET Framework 3.5 and Microsoft Chart Controls for Microsoft .NET Framework 3.5 ### *** Updated 9/20/09 with Ben's fixes http://xcud.com/post/192277838/mschart-in-psh *** ### </Description> ### <Usage> ### . ./LibraryChart.ps1 ### -------------------------- EXAMPLE 1 -------------------------- ### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' ### ### This command will produce a default column chart ### ### -------------------------- EXAMPLE 2 -------------------------- ### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' -filename 'c:\\users\\u00\\documents\\process.png' ### This command will output the chart to a file ### ### -------------------------- EXAMPLE 3 -------------------------- ### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' -chartType 'Pie' ### ### This command will produce a pie chart ### ### -------------------------- EXAMPLE 4 -------------------------- ### out-chart -xField 'name' -yField 'WS' -scriptBlock {Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 1} -chartType 'line' ### ### This command will produce a real-time line chart ### ### </Usage> ### </Script> # -------------------------------------------------------------------------- [void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") [void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms.DataVisualization") ####################### function New-Chart { param ([int]$width,[int]$height,[int]$left,[int]$top,[string]$chartTitle) # create chart object $global:Chart = New-object System.Windows.Forms.DataVisualization.Charting.Chart $global:Chart.Width = $width $global:Chart.Height = $height $global:Chart.Left = $left $global:Chart.Top = $top # create a chartarea to draw on and add to chart $chartArea = New-Object System.Windows.Forms.DataVisualization.Charting.ChartArea $global:chart.ChartAreas.Add($chartArea) [void]$global:Chart.Titles.Add([string]$chartTitle) # change chart area colour $global:Chart.BackColor = [System.Drawing.Color]::Transparent } #New-Chart ####################### function New-BarColumnChart { param ([hashtable]$ht, $chartType='Column', $chartTitle,$xTitle,$yTitle, [int]$width,[int]$height,[int]$left,[int]$top,[bool]$asc) New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle $chart.ChartAreas[0].AxisX.Title = $xTitle $chart.ChartAreas[0].AxisY.Title = $yTitle [void]$global:Chart.Series.Add("Data") $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) $global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::$chartType if ($asc) { $global:Chart.Series["Data"].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Ascending, "Y") } else { $global:Chart.Series["Data"].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Descending, "Y") } $global:Chart.Series["Data"]["DrawingStyle"] = "Cylinder" $global:chart.Series["Data"].IsValueShownAsLabel = $true $global:chart.Series["Data"]["LabelStyle"] = "Top" } #New-BarColumnChart ####################### function New-LineChart { param ([hashtable]$ht,$chartTitle, [int]$width,[int]$height,[int]$left,[int]$top) New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle [void]$global:Chart.Series.Add("Data") # $global:Chart.Series["Data"].Points.AddXY($(get-date), $($ht.Values)) $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys,$ht.Values) #$global:Chart.Series["Data"].XValueType = [System.Windows.Forms.DataVisualization.Charting.ChartValueType]::Time #$global:Chart.chartAreas[0].AxisX.LabelStyle.Format = "hh:mm:ss" #$global:Chart.chartAreas[0].AxisX.LabelStyle.Interval = 1 #$global:Chart.chartAreas[0].AxisX.LabelStyle.IntervalType = [System.Windows.Forms.DataVisualization.Charting.DateTimeIntervalType]::Seconds $global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Line #$global:chart.Series["Data"].IsValueShownAsLabel = $false } #New-LineChart ####################### function New-PieChart { param ([hashtable]$ht,$chartTitle, [int]$width,[int]$height,[int]$left,[int]$top) New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle [void]$global:Chart.Series.Add("Data") $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) $global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Pie $global:Chart.Series["Data"]["PieLabelStyle"] = "Outside" $global:Chart.Series["Data"]["PieLineColor"] = "Black" #$global:chart.Series["Data"].IsValueShownAsLabel = $true #$global:chart.series["Data"].Label = "#PERCENT{P1}" #$legend = New-object System.Windows.Forms.DataVisualization.Charting.Legend #$global:Chart.Legends.Add($legend) #$Legend.Name = "Default" } #New-PieChart ####################### function Remove-Points { param($name='Data',[int]$maxPoints=200) while ( $global:chart.Series["$name"].Points.Count > $maxPoints ) { $global:chart.Series["$name"].Points.RemoveAT(0) } } #Add-Series ####################### function Out-Form { param($interval,$scriptBlock,$xField,$yField) # display the chart on a form $global:Chart.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right -bor [System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Left $Form = New-Object Windows.Forms.Form $Form.Text = 'PowerCharts' $Form.Width = 600 $Form.Height = 600 $Form.controls.add($global:Chart) if ($scriptBlock -is [ScriptBlock]) { if (!($xField -or $yField)) { throw 'xField and yField required with scriptBlock parameter.' } $timer = New-Object System.Windows.Forms.Timer $timer.Interval = $interval $timer.add_Tick({ $ht = &$scriptBlock | ConvertTo-HashTable $xField $yField if ($global:Chart.Series["Data"].ChartTypeName -eq 'Line') { Remove-Points $ht | foreach { $global:Chart.Series["Data"].Points.AddXY($($_.Keys), $($_.Values)) } } else { $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) } $global:chart.ResetAutoValues() $global:chart.Invalidate() }) $timer.Enabled = $true $timer.Start() } $Form.Add_Shown({$Form.Activate()}) $Form.ShowDialog() } #Out-Form ####################### function Out-ImageFile { param($fileName,$fileformat) $global:Chart.SaveImage($fileName,$fileformat) } ####################### ### ConvertTo-Hashtable function based on code by Jeffery Snover ### http://blogs.msdn.com/powershell/archive/2008/11/23/poshboard-and-convertto-hashtable.aspx ####################### function ConvertTo-Hashtable { param([string]$key, $value) Begin { $hash = @{} } Process { $thisKey = $_.$Key $hash.$thisKey = $_.$Value } End { Write-Output $hash } } #ConvertTo-Hashtable ####################### function Out-Chart { param( $xField=$(throw 'Out-Chart:xField is required'), $yField=$(throw 'Out-Chart:yField is required'), $chartType='Column',$chartTitle, [int]$width=500, [int]$height=400, [int]$left=40, [int]$top=30, $filename, $fileformat='png', [int]$interval=1000, $scriptBlock, [switch]$asc ) Begin { $ht = @{} } Process { if ($_) { $thisKey = $_.$xField $ht.$thisKey = $_.$yField } } End { if ($scriptBlock) { $ht = &$scriptBlock | ConvertTo-HashTable $xField $yField } switch ($chartType) { 'Bar' {New-BarColumnChart -ht $ht -chartType $chartType -chartTitle $chartTitle -width $width -height $height -left $left -top $top -asc $($asc.IsPresent)} 'Column' {New-BarColumnChart -ht $ht -chartType $chartType -chartTitle $chartTitle -width $width -height $height -left $left -top $top -asc $($asc.IsPresent)} 'Pie' {New-PieChart -chartType -ht $ht -chartTitle $chartTitle -width $width -height $height -left $left -top $top } 'Line' {New-LineChart -chartType -ht $ht -chartTitle $chartTitle -width $width -height $height -left $left -top $top } } if ($filename) { Out-ImageFile $filename $fileformat } elseif ($scriptBlock ) { Out-Form $interval $scriptBlock $xField $yField } else { Out-Form } } } #Out-Chart
combined_dataset/train/non-malicious/sample_39_85.ps1
sample_39_85.ps1
# SharePoint references that need to remove when uninstall $ReferencesToRemoveWhenUninstall = @( @("Microsoft.SharePoint.Client"), @("Microsoft.SharePoint.Client.Runtime"), @("System.IdentityModel.Tokens.Jwt"), @("Microsoft.IdentityModel.Tokens") ) # SharePoint references that need to be copy local $CopyLocalReferences = @( @("Microsoft.SharePoint.Client"), @("Microsoft.SharePoint.Client.Runtime"), @("System.IdentityModel.Tokens.Jwt"), @("Microsoft.IdentityModel.Tokens") ) # Imports needed for VB project $VbImports = @( "Microsoft.SharePoint.Client", "System.IdentityModel.Tokens.Jwt", "Microsoft.IdentityModel.Tokens" ) Export-ModuleMember -Variable @( 'ReferencesToRemoveWhenUninstall', 'CopyLocalReferences', 'VbImports' ) # SIG # Begin signature block # MIImKgYJKoZIhvcNAQcCoIImGzCCJhcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAMiDbsEAtEffV7 # wXMx09VskzAh7lQs0k6LITOrKjlt1qCCC3YwggT+MIID5qADAgECAhMzAAAFVskg # Kx90Ml0tAAAAAAVWMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTAwHhcNMjMxMDE5MTk1MTExWhcNMjQxMDE2MTk1MTExWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCW2kg89zWnssiDG9AFq/sxqkPT43V4MZ6vwu7C4+sly46QJA4UNxSRnGDz9u8f # 18OR1/Ar9guQDqRthrOOktLaol49HZfv8l1DEeB/uguWS0qFIJe+cK6b7grVfl0S # Z7U8yOXu67n52z+QJN+iUxcIk0KWcu/sJZ8KfewKxnNDMDIHHhUHvIjQWhvKxOLC # /TwL0i4wTykXuQwbwIZuuGi7TYA82Q2LkYOLlwOTPOb0eowhcUI7CaXlU30IgoG4 # frY+mtZMZnTx0ga/a36GVNdq6NeBKzlGbLB02/WIP+c5ADDCXsheWpkizJt9aPhz # Yuont+Nx0OhIH04lJFvCqjljAgMBAAGjggF9MIIBeTAfBgNVHSUEGDAWBgorBgEE # AYI3PQYBBggrBgEFBQcDAzAdBgNVHQ4EFgQUJt8FhQFwX7g5A/0elDxkjww82dow # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwODY1KzUwMTY1NTAfBgNVHSMEGDAW # gBTm/F97uyIAWORyTrX0IXQjMubvrDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v # Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNDb2RTaWdQQ0Ff # MjAxMC0wNy0wNi5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BDQV8yMDEw # LTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBCnZlo # MxjHBVHJEP6d+0t7EDJfNB0h7j9iOX6LQiPMdQAV1xqA6Jgb/VEPSEVs076CAJn3 # KP5Jpr4DOuo12BE2CoCusZDHn+7aP2yxngMGGQcJKz4UfOzDMS9Yr2sl3R6fMP18 # T4Ce5t7IYFK36PI/HfvHO8AzB3T0KhVIifqsSwZ8mEukw/wi4duJYulYxV2lY2kM # Hwv/OKvKAsrTd338HlnuR+z9NZvStNUi1a8sTwcEMrEP8lgtoxaZe0Ypu/Ohn4Pq # TefEVWKQJLU2KFyLDkoamDde0ydAzzHYEqdBQMW0gxWyvJ9fjgF/C2PKQVu/0SMB # hcwo04eFzf/w7pZ/MIIGcDCCBFigAwIBAgIKYQxSTAAAAAAAAzANBgkqhkiG9w0B # AQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAG # A1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAw # HhcNMTAwNzA2MjA0MDE3WhcNMjUwNzA2MjA1MDE3WjB+MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT # aWduaW5nIFBDQSAyMDEwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA # 6Q5kUHlntcTj/QkATJ6UrPdWaOpE2M/FWE+ppXZ8bUW60zmStKQe+fllguQX0o/9 # RJwI6GWTzixVhL99COMuK6hBKxi3oktuSUxrFQfe0dLCiR5xlM21f0u0rwjYzIjW # axeUOpPOJj/s5v40mFfVHV1J9rIqLtWFu1k/+JC0K4N0yiuzO0bj8EZJwRdmVMkc # vR3EVWJXcvhnuSUgNN5dpqWVXqsogM3Vsp7lA7Vj07IUyMHIiiYKWX8H7P8O7YAS # NUwSpr5SW/Wm2uCLC0h31oVH1RC5xuiq7otqLQVcYMa0KlucIxxfReMaFB5vN8sZ # M4BqiU2jamZjeJPVMM+VHwIDAQABo4IB4zCCAd8wEAYJKwYBBAGCNxUBBAMCAQAw # HQYDVR0OBBYEFOb8X3u7IgBY5HJOtfQhdCMy5u+sMBkGCSsGAQQBgjcUAgQMHgoA # UwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQY # MBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6 # Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1 # dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0 # dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3J0MIGdBgNVHSAEgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9Bggr # BgEFBQcCARYxaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9k # ZWZhdWx0Lmh0bTBABggrBgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABp # AGMAeQBfAFMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA # GnTvV08pe8QWhXi4UNMi/AmdrIKX+DT/KiyXlRLl5L/Pv5PI4zSp24G43B4AvtI1 # b6/lf3mVd+UC1PHr2M1OHhthosJaIxrwjKhiUUVnCOM/PB6T+DCFF8g5QKbXDrMh # KeWloWmMIpPMdJjnoUdD8lOswA8waX/+0iUgbW9h098H1dlyACxphnY9UdumOUjJ # N2FtB91TGcun1mHCv+KDqw/ga5uV1n0oUbCJSlGkmmzItx9KGg5pqdfcwX7RSXCq # tq27ckdjF/qm1qKmhuyoEESbY7ayaYkGx0aGehg/6MUdIdV7+QIjLcVBy78dTMgW # 77Gcf/wiS0mKbhXjpn92W9FTeZGFndXS2z1zNfM8rlSyUkdqwKoTldKOEdqZZ14y # jPs3hdHcdYWch8ZaV4XCv90Nj4ybLeu07s8n07VeafqkFgQBpyRnc89NT7beBVaX # evfpUk30dwVPhcbYC/GO7UIJ0Q124yNWeCImNr7KsYxuqh3khdpHM2KPpMmRM19x # HkCvmGXJIuhCISWKHC1g2TeJQYkqFg/XYTyUaGBS79ZHmaCAQO4VgXc+nOBTGBpQ # HTiVmx5mMxMnORd4hzbOTsNfsvU9R1O24OXbC2E9KteSLM43Wj5AQjGkHxAIwlac # vyRdUQKdannSF9PawZSOB3slcUSrBmrm1MbfI5qWdcUxghoKMIIaBgIBATCBlTB+ # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9N # aWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDEwAhMzAAAFVskgKx90Ml0tAAAA # AAVWMA0GCWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE # MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCA+ # YfAmPZkVWfdkUwsVYCmfuvPHlKhHBY+LR0rti4fi1DBCBgorBgEEAYI3AgEMMTQw # MqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tMA0GCSqGSIb3DQEBAQUABIIBAFv1rU8jsxnQjzEyrqzKPst+zeMjO5IfSDuq # Z+Kir1tSWxYOj1lfty2A3YP4Hm/39hO76teOx2EZdW9qgsTInqHinknPXK2QfPjY # o0gFheUxmMpmVMdYUoY2QDFzEeLg6pMLFaJDRLGO2c0SToR9O860KCCsmJLqB2xa # 97NYWnGllXMJ6E/oFCVGzNDsCgsSQeh4Yan8ATktyRSaKPG+tfx9USUCb/ni/0bJ # rHHGMfhay2nB56NKiekdEp7WrGvGvAX+tq6RE5cvtc1IZI8ybH3JNRSTskKSE/fk # cm2es6hpNOks5L6eubwx0Tm+UvfFhGv9fLkpoSZt25CgHwYNB6yhgheUMIIXkAYK # KwYBBAGCNwMDATGCF4Awghd8BgkqhkiG9w0BBwKgghdtMIIXaQIBAzEPMA0GCWCG # SAFlAwQCAQUAMIIBUgYLKoZIhvcNAQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQB # hFkKAwEwMTANBglghkgBZQMEAgEFAAQg7oBJGD7u/tFHoIWuoQ5RC5eHx27SLOCe # U1w1CE+3u2sCBmXODm4aJhgTMjAyNDAyMjcxMzQ5MTMuMzY3WjAEgAIB9KCB0aSB # zjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UE # CxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNloIIR6jCCByAwggUIoAMCAQICEzMAAAHzxQpDrgPMHTEA # AQAAAfMwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTAwHhcNMjMxMjA2MTg0NjAyWhcNMjUwMzA1MTg0NjAyWjCByzELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFt # ZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA/p+m2uErgfYkjuVjIW54 # KmAG/s9yH8zaWSFkv7IH14ZS2Jhp7FLaxl9zlXIPvJKyXYsbjVDDu2QDqgmbF1Iz # s/M3J9WlA+Q9q9j4c1Sox7Yr1hoBo+MecKlntUKL97zM/Fh7CrH2nSJVo3wTJ1Sl # aJjsm0O/to3OGn849lyUEEphPY0EaAaIA8JqmWpHmJyMdBJjrrnD6+u+E+v2Gkz4 # iGJRn/l1druqEBwJDBuesWD0IpIrUI4zVhwA3wamwRGqqaWrLcaUTXOIndktcVUM # XEBl45wIHnlW2z2wKBC4W8Ps91XrUcLhBSUc0+oW1hIL8/SzGD0m4qBy/MPmYlqN # 8bsN0e3ybKnu6arJ48L54j+7HxNbrX4u5NDUGTKb4jrP/9t/R+ngOiDlbRfMOuoq # RO9RGK3EjazhpU5ubqqvrMjtbnWTnijNMWO9vDXBgxap47hT2xBJuvnrWSn7VPY8 # Swks6lzlTs3agPDuV2txONY97OzJUxeEOwWK0Jm6caoU737iJWMCNgM3jtzor3Hs # ycAY9hUIE4lR2nLzEA4EgOxOb8rWpNPjCwZtAHFuCD3q/AOIDhg/aEqa5sgLtSes # BZAa39ko5/onjauhcdLVo/CKYN7kL3LoN+40mnReqta1BGqDyGo2QhlZPqOcJ+q7 # fnMHSd/URFON2lgsJ9Avl8cCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTDZBX2pRFR # DIwNwKaFMfag6w0KJDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA38Qcj/zR/u/b # 3N5YjuHO51zP1ChXAJucOtRcUcT8Ql0V5YjY2e7A6jT9A81EwVPbUuQ6pKkUoiFd # eY+6vHunpYPP3A9279LFuBqPQDC+JYQOTAYN8MynYoXydBPxyKnB19dZsLW6U4gt # rIAFIe/jmZ2/U8CRO6WxATyUFMcbgokuf69LNkFYqQZov/DBFtniIuJifrxyOQwm # gBqKE+ANef+6DY/c8s0QAU1CAjTa0tfSn68hDeXYeZKjhuEIHGvcOi+wi/krrk2Y # tEmfGauuYitoUPCDADlcXsAqQ+JWS+jQ7FTUsATVzlJbMTgDtxtMDU/nAboPxw+N # wexNqHVX7Oh9hGAmcVEta4EXhndrqkMYENsKzLk2+cpDvqnfuJ4Wn//Ujd4HraJr # UJ+SM4XwpK2k9Sp2RfEyN8ntWd6Z3q9Ap/6deR+8DcA5AQImftos/TVBHmC3zBpv # bxKw1QQ0TIxrBPx6qmO0E0k7Q71O/s2cETxo4mGFBV0/lYJH3R4haSsONl7JtDHy # +Wjmt9RcgjNe/6T0yCk0YirAxd+9EsCMGQI1c4g//UIRBQbvaaIxVCzmb87i+Ykh # CSHKqKVQMHWzXa6GYthzfJ3w48yWvAjE5EHkn0LEKSq/NzoQZhNzBdrM/IKnt5aH # NOQ1vCTb2d9vCabNyyQgC7dK0DyWJzswggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDTTCCAjUCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4RDAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIj # CgEBMAcGBSsOAwIaAxUAbvoGLNi0YWuaRTu/YNy5H8CkZyiggYMwgYCkfjB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOmIXgYw # IhgPMjAyNDAyMjcxMzExMzRaGA8yMDI0MDIyODEzMTEzNFowdDA6BgorBgEEAYRZ # CgQBMSwwKjAKAgUA6YheBgIBADAHAgEAAgIGKDAHAgEAAgITsjAKAgUA6YmvhgIB # ADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQow # CAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAaKphou+rXqLatT6XHIUy5D34O # 50YQArjqAXRJxZ5bk+kACDA21Ni0RT8TAeC9frmB651HcD0VAlk5jE+MjAP4g2y5 # 81YPoYANOGRtOwRSNXMA1d/YZ0hM7ucwA2cE0O62gMyZmvpuruHhlZOEeGEq56CI # dd+tnhoVL01VLZNs5RMy579Zc8fo2ktdxiPjh6eFXj59QBFXc9JkFBpm+QbB4Bf1 # 4gCbt4dinakb1Fns0uKl7Mdhi/ZL7IvAhxHO1OR4QiBA47iJtLd6By4fxGJCfih/ # jg//b9Mw4iQJN8hNwsrzRk5DBJlNAI4kHj0NXsRKYpKdzP6ayDheIZU5ex6RMYIE # DTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHz # xQpDrgPMHTEAAQAAAfMwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzEN # BgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgyD40BKcFceEzA9BVGzG4uqvx # fu3lhg6DnPrSvXV807EwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAYvNk0 # i7bhuFZKfMAZiZP0/kQIfONbBv2gzsMYOjti6DCBmDCBgKR+MHwxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU # aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB88UKQ64DzB0xAAEAAAHzMCIEIFB9h0hM # DTyi0mt23a6fugqNRYba9zH9ooqJwnxL+4iuMA0GCSqGSIb3DQEBCwUABIICACHq # Gbk57/k1xCymO1EtOowey6qmeMRLOZzwIKxQXbwTS/tJxi3KYUB1JXS19cilWOig # BFUCeX/xcylcAu1JaoFwS1MlY8tdelHx7D4+/n+7SdZRczQzXR5tzMHi1npgAlRx # XEM2di+9xNo+ZdZzVFR7pfstAFB/WkooUhpSbu1y0InUkx8e8Oi4f3yNgZ2XAf/9 # zhqgcKl9i+lrmKAWgrBVRbtAcuTgQAMjSTucc4i1GQYrnuUCnV576Gtq0qNIihS2 # O4FjsEXnl0qu2l97bC2GXthHheOPWfnCO6QeZN0aSqr1p6XdEW3RL0Abf40r80HX # p3n8cE3G0rtoUq7GhxtV1uTW9nUie9VVHs20LSgYhiC6RGAQ8Tqr2dqOVK2z6Klz # xUYYBYryUoyJTdUAv42q5EOjwqZBEiNmyVB/vXNfWg48xIS0LsJXp86easZrCm5u # eUV79gsuHG8yWP/Bw9WpuF7+4ghnDkarEcyQVZ8eKBsG4LBC/Om+mzTussmLY/J6 # jOnk+oYKDvYmo6abKaO84Uy9oronoIxh4TNDYoEIfQ2wOkKQGNLPeRXDc13AaYWR # h49/vhHafERAmRdjIQazoG9rbF+pFIEDFBqGjdyT+JxU8b764RHnBCPtjC+GPyk+ # bmYtAWCraHzGz9knYANerfK8Wl8qgfcVFfKkbSdY # SIG # End signature block
combined_dataset/train/non-malicious/Enable-RemoteCredSSP.ps1
Enable-RemoteCredSSP.ps1
##############################################################################\n##\n## Enable-RemoteCredSSP\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nEnables CredSSP support on a remote computer. Requires that the machine\nhave PowerShell Remoting enabled, and that its operating system is Windows\nVista or later.\n\n.EXAMPLE\n\nEnable-RemoteCredSSP <Computer>\n\n#>\n\nparam(\n ## The computer on which to enable CredSSP\n $Computername,\n\n ## The credential to use when connecting\n $Credential = (Get-Credential)\n)\n\nSet-StrictMode -Version Latest\n\n## Call Get-Credential again, so that the user can type something like\n## Enable-RemoteCredSSP -Computer Computer -Cred DOMAIN\\user\n$credential = Get-Credential $credential\n$username = $credential.Username\n$password = $credential.GetNetworkCredential().Password\n\n## Define the script we will use to create the scheduled task\n$powerShellCommand =\n "powershell -noprofile -command Enable-WsManCredSSP -Role Server -Force"\n$script = @"\nschtasks /CREATE /TN 'Enable CredSSP' /SC WEEKLY /RL HIGHEST ``\n /RU $username /RP $password ``\n /TR "$powerShellCommand" /F\n\nschtasks /RUN /TN 'Enable CredSSP'\n"@\n\n## Create the task on the remote system to configure CredSSP\n$command = [ScriptBlock]::Create($script)\nInvoke-Command $computername $command -Cred $credential\n\n## Wait for the remoting changes to come into effect\nfor($count = 1; $count -le 10; $count++)\n{\n $output =\n Invoke-Command $computername { 1 } -Auth CredSSP -Cred $credential\n if($output -eq 1) { break; }\n\n "Attempt $count : Not ready yet."\n Sleep 5\n}\n\n## Clean up\n$command = [ScriptBlock]::Create($script)\nInvoke-Command $computername {\n schtasks /DELETE /TN 'Enable CredSSP' /F } -Cred $credential\n\n## Verify the output\nInvoke-Command $computername {\n Get-WmiObject Win32_ComputerSystem } -Auth CredSSP -Cred $credential
combined_dataset/train/non-malicious/BufferBox 3.5.ps1
BufferBox 3.5.ps1
#################################################################################################### ## This script is just a demonstration of some of the things you can do with the buffer ## in the default PowerShell host... it serves as a reminder of how much work remains on ## PoshConsole, and as an inspiration to anyone who is thinking about trying to create ## "interactive" PowerShell applications. ## ## Try Test-DisplayBox and then Test-BufferBox (note it has tab completion and everything). #################################################################################################### $global:BoxChars = new-object PSObject -Property @{ 'HorizontalDouble' = ([char]9552).ToString() 'VerticalDouble' = ([char]9553).ToString() 'TopLeftDouble' = ([char]9556).ToString() 'TopRightDouble' = ([char]9559).ToString() 'BottomLeftDouble' = ([char]9562).ToString() 'BottomRightDouble' = ([char]9565).ToString() 'HorizontalDoubleSingleDown' = ([char]9572).ToString() 'HorizontalDoubleSingleUp' = ([char]9575).ToString() 'Horizontal' = ([char]9472).ToString() 'Vertical' = ([char]9474).ToString() 'TopLeft' = ([char]9484).ToString() 'TopRight' = ([char]9488).ToString() 'BottomLeft' = ([char]9492).ToString() 'BottomRight' = ([char]9496).ToString() 'Cross' = ([char]9532).ToString() 'VerticalDoubleRightSingle' = ([char]9567).ToString() 'VerticalDoubleLeftSingle' = ([char]9570).ToString() } $global:RectType = "system.management.automation.host.rectangle" function Show-ConsoleMenu { param( [Parameter(ValueFromPipeline=$true)] [Array]$choices, [string]$Caption, [int]$indentLeft=8, [Switch]$Passthru , [Switch]$UseBufferBox ) begin { $allchoices = New-Object System.Collections.ArrayList } process { if($choices) { $allchoices.AddRange($choices) } } end { # Make a hashtable with keys $hashChoices = @{} for($i=0; $i -lt $allchoices.Count; $i++) { $hashChoices."$i" = $allchoices[$i] } # output the menu to the screen $menu = $hashChoices | Format-Table -HideTableHeader @{E="Key";A="Right";W=$indentLeft}, @{E="Value";A="Left"} | Out-String $menu = "`n" + (" " * ($indentLeft/2)) + $Caption + "`n" + $menu.TrimEnd() + "`n" if($UseBufferBox) { $menu -split "`n" | Out-Buffer } else { $menu } # get a choice from the user do { [string]$Key = $Host.UI.RawUI.ReadKey("IncludeKeyDown,NoEcho").Character } while(!$hashChoices.ContainsKey($Key) -and !(13,27 -contains [int][char]$Key)) if($Passthru) { $hashChoices.$Key } else { $Key -as [int] } }} function Reset-Buffer { param( $Position = $Host.UI.RawUI.WindowPosition, [int]$Height = $Host.UI.RawUI.WindowSize.Height, [int]$Width = $Host.UI.RawUI.WindowSize.Width, # Note: all edges are padded by 1 for the box edges, but we also pad each side by this ammount: [int]$Padding = 1, $ForegroundColor = $Host.UI.RawUI.ForegroundColor, $BackgroundColor = $Host.UI.RawUI.BackgroundColor, $BorderColor = "Yellow", [switch]$NoBorder, [switch]$ShowInput, [string]$Title = "" ) $global:BufferHeight = $Height $global:BufferWidth = $Width $global:BufferPadding = $Padding $global:BufferForegroundColor = $ForegroundColor $global:BufferBackgroundColor = $BackgroundColor $global:BufferBorderColor = $BorderColor if($NoBorder) { $global:BufferBoxSides = 0 } else { $global:BufferBoxSides = 2 } if($ShowInput) { $global:BufferHeight -= 2 } $Host.UI.RawUI.SetBufferContents($Position,(New-BufferBox $BufferHeight $BufferWidth -Title:$Title -NoBorder:$NoBorder -ShowInput:$ShowInput -Background $BufferBackgroundColor -Border $BufferBorderColor)) $global:BufferPosition = $Position $global:BufferPosition.X += $global:BufferPadding + ($global:BufferBoxSides/2) # this gets set to the BOTTOM line, because I assume text will flow in from the bottom. $global:BufferPosition.Y += $global:BufferHeight - 2 # and this goes below that ... $global:BufferPromptPosition = $BufferPosition $global:BufferPromptPosition.Y += 2 $global:BufferPromptPosition.X += 2 - $global:BufferPadding # Prompt = "> " } function New-BufferBox { param( [int]$Height = $global:BufferHeight, [int]$Width = $global:BufferWidth, $Title = "", [switch]$NoBorder, [switch]$ShowInput, $BackgroundColor = $global:BufferBackgroundColor, $BorderColor = $global:BufferBorderColor ) $Width = $Width - $global:BufferBoxSides $LineTop =( $global:BoxChars.HorizontalDouble * 2) + $Title ` + $($global:BoxChars.HorizontalDouble * ($Width - ($Title.Length+2))) $LineField = ' ' * $Width $LineBottom = $global:BoxChars.HorizontalDouble * $Width $LineSeparator = $global:BoxChars.Horizontal * $Width $LinePrompt = '> ' + ' ' * ($Width-2) # Prompt = "> " if(!$NoBorder) { $LineField = $global:BoxChars.VerticalDouble + $LineField + $global:BoxChars.VerticalDouble $LinePrompt = $global:BoxChars.VerticalDouble + $LinePrompt + $global:BoxChars.VerticalDouble $LineBottom = $global:BoxChars.BottomLeftDouble + $LineBottom + $global:BoxChars.BottomRightDouble $LineTop = $global:BoxChars.TopLeftDouble + $LineTop + $global:BoxChars.TopRightDouble $LineSeparator = $global:BoxChars.VerticalDoubleRightSingle + $LineSeparator + $global:BoxChars.VerticalDoubleLeftSingle } if($ShowInput) { $box = &{$LineTop;1..($Height - 2) |% {$LineField};$LineSeparator;$LinePrompt;$LineBottom} } else { $box = &{$LineTop;1..($Height - 2) |% {$LineField};$LineBottom} } $boxBuffer = $Host.UI.RawUI.NewBufferCellArray($box,$BorderColor,$BackgroundColor) return ,$boxBuffer } function Move-Buffer { param( $Position = $global:BufferPosition, [int]$Left = $($global:BufferBoxSides/2), [int]$Top = (2 - $global:BufferHeight), [int]$Width = $global:BufferWidth - $global:BufferBoxSides, [int]$Height = $global:BufferHeight, [int]$Offset = -1 ) $Position.X += $Left $Position.Y += $Top $Rect = New-Object $RectType $Position.X, $Position.Y, ($Position.X + $width), ($Position.Y + $height -1) $Position.Y += $OffSet $Host.UI.RawUI.ScrollBufferContents($Rect, $Position, $Rect, (new-object System.Management.Automation.Host.BufferCell(' ',$global:BufferForegroundColor,$global:BufferBackgroundColor,'complete'))) } function Out-Buffer { param( [Parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] $Message, [Parameter(ValueFromPipelineByPropertyName=$true)] $ForegroundColor = $global:BufferForegroundColor, [Parameter(ValueFromPipelineByPropertyName=$true)] $BackgroundColor = $global:BufferBackgroundColor, [switch]$NoScroll, [Parameter(ValueFromPipelineByPropertyName=$true)] $Position = $global:BufferPosition, [Parameter(ValueFromPipelineByPropertyName=$true)] [int]$Left = 0, [Parameter(ValueFromPipelineByPropertyName=$true)] [int]$Top = $(3 - $global:BufferHeight), # Box Edge + New Lines [Parameter(ValueFromPipelineByPropertyName=$true)] [int]$Width = ($global:BufferWidth - $global:BufferBoxSides), # Box Edge [Parameter(ValueFromPipelineByPropertyName=$true)] [int]$Height = ($global:BufferHeight - $global:BufferBoxSides), # Box Edge [Parameter(ValueFromPipelineByPropertyName=$true)] [int]$Offset = $( 0 - ($Message.Split("`n").Count)) ) process { $lineCount = $Message.Split("`n").Count $Width = $Width - ($global:BufferPadding * 2) if(!$NoScroll){ Move-Buffer $Position $Left $Top $Width $Height $Offset } $MessageBuffer = New-Object "System.Management.Automation.Host.BufferCell[,]" $lineCount, $width $index = 0 foreach( $line in $Message.Split("`n") ) { $Buffer = $Host.UI.RawUI.NewBufferCellArray( @($line.Trim("`r").PadRight($Width)), $ForegroundColor, $BackgroundColor ) for($i = 0; $i -lt $width; $i++) { $MessageBuffer[$index,$i] = $Buffer[0,$i] } $index++ } $Y = $global:BufferPosition.Y $global:BufferPosition.Y -= $lineCount - 1 $Host.UI.RawUI.SetBufferContents($global:BufferPosition,$MessageBuffer) $global:BufferPosition.Y = $Y } } function Set-BufferInputLine { param([String]$Line = "") $PromptText = $line.PadRight(($global:BufferWidth - $line.Length - 3)) # Prompt = "> " $CursorPosition = $BufferPromptPosition $CursorPosition.X += $line.Length $Prompt = $Host.UI.RawUI.NewBufferCellArray( @($PromptText),$global:BufferForegroundColor, $global:BufferBackgroundColor) $Host.UI.RawUI.SetBufferContents( $BufferPromptPosition, $prompt ) $Host.UI.RawUI.CursorPosition = $CursorPosition } function Test-DisplayBox { $Position = $Host.UI.RawUI.WindowPosition $Position.X += 10 $Position.Y += 3 Reset-Buffer $Position 20 66 3 -ForegroundColor 'Gray' -BackgroundColor 'Black' -BorderColor 'Green' Out-Buffer 'Greetings!' 'Yellow' 'black' sleep -m 600 Out-Buffer '' 'Gray' 'black' sleep -m 600 Out-Buffer '- - - Thank you for running this simple demo script! - - -' 'Green' 'black' sleep -m 600 Out-Buffer '' 'Gray' 'black' sleep -m 600 Out-Buffer 'We are demonstrating how the scroll buffer works: you can add more than one line at a time, but you don''t really need to, since they add almost as fast one at a time.' 'white' 'black' sleep -m 3000 Out-Buffer '' 'Gray' 'black' Out-Buffer 'That is, as long as you don''t have any delay, you can just' 'white' 'black' Out-Buffer 'write out as many lines as you like, one-at-a-time, like' 'white' 'black' Out-Buffer 'this, and there is really no downside to doing that.' 'white' 'black' sleep -m 3000 Out-Buffer '' 'Gray' 'black' Out-Buffer 'Right? '.PadRight(58,"-") 'Red' 'black' Out-Buffer '' 'Gray' 'black' sleep -m 600 Out-Buffer 'It''s clearly not as slick to just pop in multiple lines' 'white' 'black' sleep -m 1200 Out-Buffer 'with absolutely no scroll delay, and it makes it a little ' 'white' 'black' sleep -m 1200 Out-Buffer 'hard to tell what you have read already, but that''s ok.' 'white' 'black' sleep -m 1200 Out-Buffer '' 'Gray' 'black' sleep -m 600 Out-Buffer 'If you delay between paragraphs.' 'Red' 'black' sleep -m 600 Out-Buffer '' 'Gray' 'black' sleep -m 600 Out-Buffer 'But: don''t scroll off-screen faster than I can read!' 'Yellow' 'black' sleep -m 600 Out-Buffer '' 'Gray' 'black' } ## Test-BufferBox 3.1 - Now with Tab completion #################################################################################################### ## Imagine it's a chat window: you can type, but the whole time, the ongoing conversation in the ## chat room you have joined is going on in the background. ## ## NOTE: because this is a "chat" demo, we treat your input as text, and to execute script in-line ## you have to enclose it inside $() braces. #################################################################################################### function Test-BufferBox { param( $title = "PowerShell Interactive Buffer Demo" ) Reset-Buffer -ShowInput -Title $Title ################################################################################################### ##### We only need this for the purposes of the demo... ##### In a real script you would, presumably, be getting stuff from somewhere else to display $noise = $MyInvocation.MyCommand.Definition -split "`n" $index = 0; $random = New-Object "Random" [regex]$chunker = @' [^ \\"']+|([\\"'])[^\\\\1]*?\\\\1[^ \\"']*|([\\"'])[^\\\\1]*$| $ '@ ##### Printing a "How to Exit" message Out-Buffer " " -Fore DarkGray -Back Cyan Out-Buffer " This is just a demo. " -Fore Black -Back Cyan Out-Buffer " We will stream in the source code of this script ... " -Fore Black -Back Cyan Out-Buffer " And you can type at the bottom while it's running. " -Fore Black -Back Cyan Out-Buffer " Imagine this as an n-way chat application like IRC, except that " -Fore Black -Back Cyan Out-Buffer " FOR THIS PERFORMANCE ONLY: " -Fore Black -Back Cyan Out-Buffer " The part of your chatting friends is played by my source code. " -Fore DarkGray -Back Cyan Out-Buffer " " -Fore DarkGray -Back Cyan Out-Buffer " Press ESC to exit, or enter 'exit' and hit Enter" -Fore Black -Back Cyan Out-Buffer " " -Fore DarkGray -Back Cyan ##### Setting the prompt Set-BufferInputLine ##### And initializing our two variables ... $line="" $exit = $false switch(Show-ConsoleMenu "Continue the demo","Stop the demo","Exit PowerShell" "What would you like to do now?" -UseBuffer) { 0 { <# do nothing, will continue #> } 1 { $exit = $true <#this script exits cleanly below#> } 2 { exit <# stop abruptly #> } } while(!$exit){ while(!$exit -and $Host.UI.RawUI.KeyAvailable) { $char = $Host.UI.RawUI.ReadKey("IncludeKeyUp,IncludeKeyDown,NoEcho"); # we don't want the key up events, but we do want to get rid of them if($char.KeyDown) { switch([int]$char.Character) { 13 { # Enter if($line.Trim() -eq "exit") { $exit = $true; break; } ################################################################################################### ################################################################################################### ############# WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING ############# ############# This executes the user input! ############# ############# Don't use this on, say, content you got from a web page or chat room ############# iex "Out-Buffer `"$line`" -Fore Red"; ############# ################################################################################################### ################################################################################################### $line = ""; Set-BufferInputLine break; } 27 { # Esc $exit = $true; break; } 9 { # Tab if($line.Length -gt 0) { [Array]$words = $chunker.Matches($line) if($words.Count -ge 1) { Out-Buffer ($Words | Out-String) -Fore Black -Back White $lastWord = $words[$($words.Count-1)].Value $trim = $lastWord.TrimEnd("`r","`n") ## This may return more than one ... in which case subsequent tabs should iterate through them ## But for demo purposes, this is more than enough work... $replacement = TabExpansion -Line $line -LastWord ($lastWord.Trim() -replace '"') Out-Buffer ($replacement | Out-String) -Fore Black -Back White $line = $line.SubString(0, $line.Length - $lastWord.Length) + @($replacement)[0] Set-BufferInputLine $line } } break; } 8 { # Backspace if($line.Length -gt 0) { $line = $line.SubString(0,$($line.Length-1)) } # $pos = $Host.UI.RawUI.CursorPosition Set-BufferInputLine $line break; } 0 { # Not actually a key # Out-Buffer $($Char | Out-String) break; } default { $line += $char.Character Set-BufferInputLine $line } } } } # Simulate doing useful things 25% of the time if($random.NextDouble() -gt 0.75) { $noise[($index)..($index++)] | Out-Buffer if($index -ge $noise.Length){$index = 0} } sleep -milli 100 } $CursorPosition = $BufferPromptPosition $CursorPosition.Y += 2 $CursorPosition.X = 0 $Host.UI.RawUI.CursorPosition = $CursorPosition }
combined_dataset/train/non-malicious/Dell Order Status_1.ps1
Dell Order Status_1.ps1
# Version: 0.1 # Author: Stefan Stranger # Description: Retrieve Dell Order Status # Start Page Order Status USA: https://support.dell.com/support/order/status.aspx?c=us&cs=19&l=en&s=dhs&~ck=pn # Start Page Order Status EMEA(nl): http://support.euro.dell.com/support/index.aspx?c=nl&l=nl&s=gen&~ck=bt # Example Dell Order Status URL: http://support.euro.dell.com/support/order/emea/OrderStatus.aspx?c=nl&l=nl&s=gen&ir=[IR Number]&ea=[emailaddress]' #param ([string]$url = $(read-host "Please enter Dell Order Status URL")) $wc = New-Object System.Net.WebClient $url = 'http://support.euro.dell.com/support/order/emea/OrderStatus.aspx?c=nl&l=nl&s=gen&ir=NL0131-8510-29070&ea=stefan.stranger@getronics.com' $RawResult = $wc.DownloadString($url) # $RawResult = gc orderstatus.txt # Search for the Estimated Delivery Date in the url that starts with the word "lever" (Levering is the Dutch word for Delivery" and # and ends with </B></TD></TR> # You should probable need to change the string "Lever" in "Deliv" or something $r = New-Object regex('Lever.*?(\\d+-\\d+-\\d{4})</B></TD></TR>','SingleLine' ) # String block with the Estimated Delivery Date $m = $r.Matches($RawResult) # Extract Delivery Date from string block $date = ($m |% {$_.groups[1].value }) # Search for Current Order Status ("In preproduction" is Dutch for "In preproduction" $r = New-Object regex('target="popup:640x480">(.*?)</a>' ) $m = $r.Matches($RawResult) $status = ($m |% {$_.groups[1].value }) $Orderstatus = 1 | select @{name='Status';expression={$status[0]}},@{name='Estimated Delivery Date';expression={$date}} $Orderstatus | ft -a #[string]$output = $orderstatus $startdate = "16-09-2007" $startdate $currentdate = (get-date).ToString('MM-dd-yyyy') $currentdate $date
combined_dataset/train/non-malicious/4074.ps1
4074.ps1
[CmdletBinding()] param ( [switch]$SystemInstall, [ValidateNotNullOrEmpty()][string]$InstallLocation = 'C:\windows\system32', [switch]$UserConfig, [ValidateNotNullOrEmpty()][string]$PSConsoleTitle = 'CMTrace Installation' ) function Close-Process { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][string]$ProcessName ) $Process = Get-Process $ProcessName -ErrorAction SilentlyContinue If ($Process) { Do { $Count++ Write-Host "Closing"$Process.ProcessName"....." -NoNewline $Process | Stop-Process -Force Start-Sleep -Seconds 5 $Process = Get-Process $ProcessName -ErrorAction SilentlyContinue If ($Process) { Write-Host "Failed" -ForegroundColor Red } else { Write-Host "Success" -ForegroundColor Yellow } } while (($Process) -and ($Count -lt 5)) } } function Set-ConsoleTitle { [CmdletBinding()] param ( [Parameter(Mandatory = $true)][String]$ConsoleTitle ) $host.ui.RawUI.WindowTitle = $ConsoleTitle } function Get-RelativePath { [CmdletBinding()][OutputType([string])] param () $Path = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\" Return $Path } function Install-CMTraceExecutable { [CmdletBinding()] param () Close-Process -ProcessName 'CMTrace' $RelativePath = Get-RelativePath $SourceFile = $RelativePath + 'CMTrace.exe' Write-Host "Installing CMTrace.exe....." -NoNewline Copy-Item -Path $SourceFile -Destination $InstallLocation -Force If ((Test-Path $InstallLocation) -eq $true) { Write-Host "Success" -ForegroundColor Yellow $Success = $true } else { Write-Host "Failed" -ForegroundColor Red $Success = $false } Return $Success } function Register-CMTraceToHKCR { [CmdletBinding()][OutputType([boolean])] param () New-PSDrive -Name HKCR -PSProvider Registry -Root HKEY_CLASSES_ROOT | Out-Null $Success = $true $MUICacheRegKey = 'HKCR:\Local Settings\Software\Microsoft\Windows\Shell\MuiCache' $ApplicationCompany = $InstallLocation + '.ApplicationCompany' $ApplicationCompanyValue = 'Microsoft Corporation' $FriendlyName = $InstallLocation + '.FriendlyAppName' $FriendlyNameValue = "CMTrace.exe" $LogfileRegKey = "HKCR:\Logfile\Shell\Open\Command" $TestKey = Get-ItemProperty $MUICacheRegKey -Name $ApplicationCompany -ErrorAction SilentlyContinue Write-Host 'Register HKCR Application Company.....' -NoNewline If ($TestKey.$ApplicationCompany -ne $ApplicationCompanyValue) { New-ItemProperty -Path $MUICacheRegKey -Name $ApplicationCompany -Value $ApplicationCompanyValue -PropertyType String | Out-Null $TestKey = Get-ItemProperty -Path $MUICacheRegKey -Name $ApplicationCompany -ErrorAction SilentlyContinue If ($TestKey.$ApplicationCompany -eq $ApplicationCompanyValue) { Write-Host 'Success' -ForegroundColor Yellow } else { Write-Host 'Failed' -ForegroundColor Red $Success = $false } } else { Write-Host 'Already Registered' -ForegroundColor Yellow } Write-Host 'Register HKCR Friendly Application Name.....' -NoNewline $TestKey = Get-ItemProperty $MUICacheRegKey -Name $FriendlyName -ErrorAction SilentlyContinue If ($TestKey.$FriendlyName -ne $FriendlyNameValue) { New-ItemProperty -Path $MUICacheRegKey -Name $FriendlyName -Value $FriendlyNameValue -PropertyType String -ErrorAction SilentlyContinue | Out-Null $TestKey = Get-ItemProperty -Path $MUICacheRegKey -Name $FriendlyName -ErrorAction SilentlyContinue If ($TestKey.$FriendlyName -eq $FriendlyNameValue) { Write-Host 'Success' -ForegroundColor Yellow } else { Write-Host 'Failed' -ForegroundColor Red $Success = $false } } else { Write-Host 'Already Registered' -ForegroundColor Yellow } If ((Test-Path $LogfileRegKey) -eq $true) { Write-Host "Removing HKCR:\Logfile....." -NoNewline Remove-Item -Path "HKCR:\Logfile" -Recurse -Force If ((Test-Path "HKCR:\Logfile") -eq $false) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red } } Write-Host 'Register HKCR Logfile Classes Root.....' -NoNewline New-Item -Path $LogfileRegKey -Force | Out-Null New-ItemProperty -Path $LogfileRegKey -Name '(Default)' -Value $InstallLocation -Force | Out-Null $TestKey = Get-ItemProperty -Path $LogfileRegKey -Name '(Default)' -ErrorAction SilentlyContinue If ($TestKey.'(Default)' -eq $InstallLocation) { Write-Host 'Success' -ForegroundColor Yellow } else { Write-Host 'Failed' -ForegroundColor Red $Success = $false } Return $Success } function Register-CMTraceToHKCU { [CmdletBinding()][OutputType([boolean])] param () $Success = $true $ClassesLogFileRegKey = "HKCU:\SOFTWARE\Classes\Log.file\Shell\Open\Command" $ClassesLogFileRegKeyValue = [char]34 + $InstallLocation + [char]34 + [char]32 + [char]34 + "%1" + [char]34 If ((Test-Path "HKCU:\SOFTWARE\Classes\Log.file") -eq $true) { Write-Host "Removing HKCU Log.File association....." -NoNewline Remove-Item -Path "HKCU:\SOFTWARE\Classes\Log.file" -Recurse -Force If ((Test-Path $ClassesLogFileRegKey) -eq $false) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red $Success = $false } } Write-Host "Register HKCU Log.File association....." -NoNewline New-Item -Path $ClassesLogFileRegKey -Force | Out-Null New-ItemProperty -Path $ClassesLogFileRegKey -Name '(Default)' -Value $ClassesLogFileRegKeyValue -Force | Out-Null $TestKey = Get-ItemProperty -Path $ClassesLogFileRegKey -Name '(Default)' -ErrorAction SilentlyContinue If ($TestKey.'(Default)' -eq $ClassesLogFileRegKeyValue) { Write-Host 'Success' -ForegroundColor Yellow } else { Write-Host 'Failed' -ForegroundColor Red $Success = $false } $FileExtsRegKey = "HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.log" If ((Test-Path $FileExtsRegKey) -eq $true) { Write-Host "Removing HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.log....." -NoNewline Remove-Item -Path $FileExtsRegKey -Recurse -Force If ((Test-Path $FileExtsRegKey) -eq $false) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red $Success = $false } } Write-Host "Registering .log key....." -NoNewline New-Item -Path $FileExtsRegKey -Force | Out-Null If ((Test-Path $FileExtsRegKey) -eq $true) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red $Success = $false } $OpenWithList = "HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.log\OpenWithList" Write-Host "Registering HKCU OpenWithList....." -NoNewline New-Item -Path $OpenWithList -Force | Out-Null New-ItemProperty -Path $OpenWithList -Name "a" -Value "CMTrace.exe" -PropertyType String -Force | Out-Null New-ItemProperty -Path $OpenWithList -Name "b" -Value "NOTEPAD.EXE" -PropertyType String -Force | Out-Null New-ItemProperty -Path $OpenWithList -Name "MRUList" -Value "ab" -PropertyType String -Force | Out-Null $TestKeyA = Get-ItemProperty -Path $OpenWithList -Name 'a' -ErrorAction SilentlyContinue $TestKeyB = Get-ItemProperty -Path $OpenWithList -Name 'b' -ErrorAction SilentlyContinue $TestKeyMRUList = Get-ItemProperty -Path $OpenWithList -Name 'MRUList' -ErrorAction SilentlyContinue If (($TestKeyA.a -eq "CMTrace.exe") -and ($TestKeyB.b -eq "NOTEPAD.EXE") -and ($TestKeyMRUList.MRUList -eq "ab")) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red $Success = $false } $OpenWithProgids = "HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.log\OpenWithProgids" Write-Host "Registering HKCU OpenWithProgids....." -NoNewline New-Item -Path $OpenWithProgids -Force | Out-Null New-ItemProperty -Path $OpenWithProgids -Name "txtfile" -PropertyType Binary -Force | Out-Null New-ItemProperty -Path $OpenWithProgids -Name "Log.File" -PropertyType Binary -Force | Out-Null $UserChoice = "HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.log\UserChoice" Write-Host "Setting CMTrace as default viewer....." -NoNewline New-Item -Path $UserChoice -Force | Out-Null New-ItemProperty -Path $UserChoice -Name "Progid" -Value "Applications\CMTrace.exe" -PropertyType String -Force | Out-Null $TestKey = Get-ItemProperty -Path $UserChoice -Name "Progid" If ($TestKey.Progid -eq "Applications\CMTrace.exe") { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red $Success = $false } Return $Success } function Register-CMTraceToHKLM { [CmdletBinding()][OutputType([boolean])] param () $Success = $true $LogFileRegKey = "HKLM:\SOFTWARE\Classes\Logfile\Shell\Open\Command" If ((Test-Path $LogFileRegKey) -eq $true) { Remove-Item -Path "HKLM:\SOFTWARE\Classes\Logfile" -Recurse -Force } Write-Host 'Register HKLM Logfile Classes Root.....' -NoNewline New-Item -Path $LogFileRegKey -Force | Out-Null New-ItemProperty -Path $LogFileRegKey -Name '(Default)' -Value $InstallLocation -Force | Out-Null $TestKey = Get-ItemProperty -Path $LogFileRegKey -Name '(Default)' -ErrorAction SilentlyContinue If ($TestKey.'(Default)' -eq $InstallLocation) { Write-Host 'Success' -ForegroundColor Yellow } else { Write-Host 'Failed' -ForegroundColor Red $Success = $false } Return $Success } function Set-CMTraceFileLocation { [CmdletBinding()][OutputType([string])] param () If ($InstallLocation -notlike '*CMTrace.exe*') { If ($InstallLocation[$InstallLocation.count - 1] -eq '\') { $NewLocation = $InstallLocation + 'CMTrace.exe' } else { $NewLocation = $InstallLocation + '\CMTrace.exe' } } else { $NewLocation = $InstallLocation } Return $NewLocation } Set-ConsoleTitle -ConsoleTitle $PSConsoleTitle Clear-Host $Success = $true $InstallLocation = Set-CMTraceFileLocation If ($SystemInstall.IsPresent) { $Status = Install-CMTraceExecutable If ($Status = $false) { $Success = $false } $Status = Register-CMTraceToHKCR If ($Status = $false) { $Success = $false } $Status = Register-CMTraceToHKLM If ($Status = $false) { $Success = $false } } If ($UserConfig.IsPresent) { $Status = Register-CMTraceToHKCU If ($Status = $false) { $Success = $false } } If ($Success -eq $false) { Exit 1 }
combined_dataset/train/non-malicious/ESXiMgmt module sample 4.ps1
ESXiMgmt module sample 4.ps1
####################################################################################################################### # File: ESXiMgmt_search_for_guest_hostname_sample.ps1 # # Author: Alexander Petrovskiy # # Publisher: Alexander Petrovskiy, SoftwareTestingUsingPowerShell.WordPress.Com # # Copyright: © 2011 Alexander Petrovskiy, SoftwareTestingUsingPowerShell.WordPress.Com. All rights reserved. # # Prerequisites: The module was tested with Vmware ESXi 4.1 U1 on the server side and # # Vmware PowerCLI 4.1 U1 # # plink.exe 0.60.0.0 # # Usage: To load this module run the following instruction: # # Import-Module -Name ESXiMgmt -Force # # Please provide feedback in the SoftwareTestingUsingPowerShell.WordPress.Com blog. # ####################################################################################################################### param([string]$Server, [string]$User, [string]$Password, [string]$DatastoreName, [string]$Drive ) # USAGE: .\\ESXiMgmt_search_for_guest_hostname_sample.ps1 192.168.1.1 root 123 datastore3 host1ds3 cls Set-StrictMode -Version Latest Import-Module ESXiMgmt -Force; Connect-ESXi -Server $Server -Port 443 ` -Protocol HTTPS -User $User -Password $Password ` -DatastoreName $DatastoreName -Drive $Drive; $vmname = Get-ESXiVMName -VMHostname 'B45E19A64B5E418' Write-Host "Guest host $($vmname) corresponds to $($vmname)"; $hostnames = @( '1-0028687D9BSP3', '1-07B328CA254D4', '1-081D88F5DF2D4', '1-10BF79C694094', '1-15DB4C70F57B4', '1-1B154BAE5CD84', '1-1D33859002954', '1-3502988189C24', '1-3A324DA9EBE54', '1-9160383452304', '1-96B95B980BDE4', '1-B3F725FTYE56', '1-E49B84B0A4AA4', '1-FECEC772CBB74' ); $vmnamesFromHostnames = Get-ESXiVMName -VMHostname $hostnames; for ($private:i = 0; $private:i -lt $vmnamesFromHostnames.Length; $private:i++) { Write-Host "Guest host $($hostnames[$private:i]) corresponds to $($vmnamesFromHostnames[$private:i])"; }
combined_dataset/train/non-malicious/ConvertTo-CliXml_2.ps1
ConvertTo-CliXml_2.ps1
#requires -version 2.0 function ConvertTo-CliXml { param( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] [PSObject[]]$InputObject ) begin { $type = [type]::gettype("System.Management.Automation.Serializer") $ctor = $type.getconstructor("instance,nonpublic", $null, @([System.Xml.XmlWriter]), $null) $sw = new-object System.IO.StringWriter $xw = new-object System.Xml.XmlTextWriter $sw $serializer = $ctor.invoke($xw) $method = $type.getmethod("Serialize", "nonpublic,instance", $null, [type[]]@([object]), $null) $done = $type.getmethod("Done", [System.Reflection.BindingFlags]"nonpublic,instance") } process { try { [void]$method.invoke($serializer, $InputObject) } catch { write-warning "Could not serialize $($InputObject.gettype()): $_" } } end { [void]$done.invoke($serializer, @()) $sw.ToString() $xw.Close() $sw.Dispose() } }
combined_dataset/train/non-malicious/2773.ps1
2773.ps1
function Compute-FileHash { Param( [Parameter(Mandatory = $true, Position=1)] [string]$FilePath, [ValidateSet("MD5","SHA1","SHA256","SHA384","SHA512","RIPEMD160")] [string]$HashType = "MD5" ) switch ( $HashType.ToUpper() ) { "MD5" { $hash = [System.Security.Cryptography.MD5]::Create() } "SHA1" { $hash = [System.Security.Cryptography.SHA1]::Create() } "SHA256" { $hash = [System.Security.Cryptography.SHA256]::Create() } "SHA384" { $hash = [System.Security.Cryptography.SHA384]::Create() } "SHA512" { $hash = [System.Security.Cryptography.SHA512]::Create() } "RIPEMD160" { $hash = [System.Security.Cryptography.RIPEMD160]::Create() } default { "Invalid hash type selected." } } if (Test-Path $FilePath) { $File = Get-ChildItem -Force $FilePath $fileData = [System.IO.File]::ReadAllBytes($File.FullName) $HashBytes = $hash.ComputeHash($fileData) $PaddedHex = "" foreach($Byte in $HashBytes) { $ByteInHex = [String]::Format("{0:X}", $Byte) $PaddedHex += $ByteInHex.PadLeft(2,"0") } $PaddedHex $File.LastWriteTimeUtc $File.Length } else { "${FilePath} is locked or could not be found." "${FilePath} is locked or could not be not found." Write-Error -Category InvalidArgument -Message ("{0} is locked or could not be found." -f $FilePath) } } function GetShannonEntropy { Param( [Parameter(Mandatory=$True,Position=0)] [string]$FilePath ) $fileEntropy = 0.0 $FrequencyTable = @{} $ByteArrayLength = 0 if(Test-Path $FilePath) { $file = (ls $FilePath) Try { $fileBytes = [System.IO.File]::ReadAllBytes($file.FullName) } Catch { Write-Error -Message ("Caught {0}." -f $_) } foreach($fileByte in $fileBytes) { $FrequencyTable[$fileByte]++ $ByteArrayLength++ } $byteMax = 255 for($byte = 0; $byte -le $byteMax; $byte++) { $byteProb = ([double]$FrequencyTable[[byte]$byte])/$ByteArrayLength if ($byteProb -gt 0) { $fileEntropy += -$byteProb * [Math]::Log($byteProb, 2.0) } } $fileEntropy } else { "${FilePath} is locked or could not be found. Could not calculate entropy." Write-Error -Category InvalidArgument -Message ("{0} is locked or could not be found." -f $FilePath) } } if (Test-Path "$env:SystemRoot\Autorunsc.exe") { $fileRegex = New-Object System.Text.RegularExpressions.Regex "(([a-zA-Z]:|\\\\\w[ \w\.]*)(\\\w[- \w\.\\\{\}]*|\\%[ \w\.]+%+)+|%[ \w\.]+%(\\\w[ \w\.]*|\\%[ \w\.]+%+)*)" & $env:SystemRoot\Autorunsc.exe /accepteula -a * -c -h -s '*' -nobanner 2> $null | ConvertFrom-Csv | ForEach-Object { $_ | Add-Member NoteProperty ScriptMD5 $null $_ | Add-Member NoteProperty ScriptModTimeUTC $null $_ | Add-Member NoteProperty ShannonEntropy $null $_ | Add-Member NoteProperty ScriptLength $null if ($_."Image Path") { $_.ShannonEntropy = GetShannonEntropy $_."Image Path" } $fileMatches = $False if (($_."Image Path").ToLower() -match "\.bat|\.ps1|\.vbs") { $fileMatches = $fileRegex.Matches($_."Image Path") } elseif (($_."Launch String").ToLower() -match "\.bat|\.ps1|\.vbs") { $fileMatches = $fileRegex.Matches($_."Launch String") } if ($fileMatches) { for($i = 0; $i -lt $fileMatches.count; $i++) { $file = $fileMatches[$i].value if ($file -match "\.bat|\.ps1|\.vbs") { if ($file -match "%userdnsdomain%") { $scriptPath = "\\" + [System.Environment]::ExpandEnvironmentVariables($file) } elseif ($file -match "%") { $scriptPath = [System.Environment]::ExpandEnvironmentVariables($file) } else { $scriptPath = $file } } $scriptPath = $scriptPath.Trim() $_.ScriptMD5,$_.ScriptModTimeUTC,$_.ScriptLength = Compute-FileHash $scriptPath $scriptPath = $null } } $_ } } else { Write-Error "Autorunsc.exe not found in $env:SystemRoot." }
combined_dataset/train/non-malicious/sample_1_38.ps1
sample_1_38.ps1
<# ISM PowerShell Service Module This module contains a set of wrapper scripts that enable Administrator To invoke iDRAC hard reset operation from host server. #> function IsAdministrator { <# .SYNOPSIS IsAdministrator. .DESCRIPTION Use IsAdministrator to get whether the user has an Administrator role. .NOTES Author: Faizal S N #> ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator") } Function Invoke-iDRACHardReset { <# .SYNOPSIS Invoke-iDRACHardReset. .DESCRIPTION Use Invoke-iDRACHardReset to reset iDRAC remotely without impacting the Host OS setup. .PARAM force If you want to reset the iDRAC through a script or without a confirmation message; then the –force option can be used which does not ask for a confirmation and resets the iDRAC. .PARAM logCmdUsage This is reserved for internal use only. .EXAMPLE Invoke-iDRACHardReset –force .NOTES Author: Faizal S N .LINK http://en.community.dell.com/techcenter/extras/m/white_papers/20442753/download #> [CmdletBinding( SupportsShouldProcess=$True, ConfirmImpact="High" )] Param ( [switch]$force, [switch]$logCmdUsage ) Begin { if (!(IsAdministrator)) { Write-Warning "An unprivileged user '$env:username' tried to perform an iDRAC Hard Reset operation from the operating system (OS).`r`n"; Start-Sleep -s 5; break; } } Process { If( -not $force) { $key = Read-Host -Prompt "`r`nThis will reset the iDRAC. Do you want to proceed with this operation? (Y/N):" while (($key -ne "Y") -and ($key -ne "y") -and ($key -ne "n") -and ($key -ne "N") ) { $key =Read-Host -Prompt "`r`nPlease enter a valid option (Y/N):" } #End while if(($key -eq "N") -or ($key -eq "n")) { return; }#End if no } #End if no force If( -not $logCmdUsage) { $returnValue = (Get-CimInstance -namespace root\cimv2\dcim -class DCIM_iSMService|Invoke-CimMethod -MethodName iDRACHardReset -Arguments @{cmdSource=1} |select-object ReturnValue).ReturnValue } Else { $returnValue = (Get-CimInstance -namespace root\cimv2\dcim -class DCIM_iSMService|Invoke-CimMethod -MethodName iDRACHardReset -Arguments @{cmdSource=2} |select-object ReturnValue).ReturnValue } $UserName=[System.Security.Principal.WindowsIdentity]::GetCurrent().Name $TimeStamp = Get-Date -Format "ddd MMM dd HH:mm:ss yyyy" if ($returnValue -eq 0) { $message = "The iDRAC Hard Reset operation is performed by system OS user " + $UserName + " from the operating system (OS) on " + $TimeStamp + "."; } ElseIf ($returnValue -eq 1) { $message = "Unable to complete the iDRAC Hard Reset operation because BIOS on the " + "server does not support this feature."; } ElseIf ($returnValue -eq 2) { $message = "Unable to complete iDRAC Hard Reset operation because this feature " + "is supported only on 13th Generation PowerEdge servers or later."; } ElseIf ($returnValue -eq 3) { $message = "An unprivileged user " + $UserName + " tried to perform an iDRAC Hard Reset operation from the operating system (OS)."; } ElseIf ($returnValue-eq 4) { $message = "Unable to perform the iDRAC Hard Reset operation either because of an unsupported " + "CPLD firmware version or the iDRAC Hard reset feature is currently disabled on iDRAC."; } Write-host "`r`n$message`r`n"; } #End Process End{} } #In The End :) Export-ModuleMember -function Invoke-iDRACHardReset # SIG # Begin signature block # MIItDgYJKoZIhvcNAQcCoIIs/zCCLPsCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBFcS2PS7z64iHc # ODD1rkrThh/CNlnTFcnMkK92k6TjpqCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m # jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE # ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s # ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv # ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy # dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx # MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu # MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp # b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK # AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq # gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l # OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr # +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d # vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 # HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn # DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig # nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z # HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK # Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u # DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC # AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw # FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG # AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn # MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp # MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O # BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp # UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 # BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ # LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv # 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF # VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX # bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG # CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw # CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 # cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y # NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR # BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf # U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ # bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U # x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB # GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE # aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn # YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH # FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq # QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h # iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF # 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB # JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf # BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw # IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC # hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E # KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV # HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn # gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR # Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 # +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 # NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB # XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj # /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO # NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu # Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg # ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 # mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l # eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 # 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG # 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC # MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u # IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw # MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV # BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 # DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg # TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X # 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF # D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ # TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 # FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS # lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt # om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 # U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV # DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj # hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs # NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU # 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z # tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l # bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu # bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH # AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu # ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG # mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 # QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV # gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi # Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ # eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh # XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY # 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA # tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi # GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR # ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen # mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoBMIIZ/QIBATBjME8xCzAJ # BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy # dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G # CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG # AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBH+1y0299f # LEVg2MDLvtTqQ7Wy5+3A9/+NvpF6CXyNhDBABgorBgEEAYI3AgEMMTIwMKAWgBQA # RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq # hkiG9w0BAQEFAASCAYBGuz3a4m0l3MNvDXm+JMaEqcDvrksybHSHFTO/SGcpg/m5 # 8oVlp4gK0x0urKoDMkfz/eaxPJ6McfDRYd3PGDPgWNmZPfcgVGYGPk4qd+E9/NAE # gR5Q19oDrMIygt5txp3Zstqz3kiAdpBzAb66OXreZbXrV8xGsEGdnQJ67RaHCuE1 # K59U+PPS0kkmSig/blux9WSBJKaUu2jqixQoCHcvvo+Pv7B+6xY/qB77KXHDMuxV # sOGZJt/JTg483iyy+NGIpFme3jaWxb7Lt9CXmamJBTUgkAzqV/0pxPzxf74bUx7X # IPBka2DVKfhfVlCL5/bB8y0+pR2p2uTVndm4+30IJTZjeXDpDXrU3nbS4EhPO3Ov # I/bZx+TatU3HqL4qTiHoULGjFK0AKURt2DQo+pcNfFNpj/Omz2RMkpiOhoA30L5F # x1NB39pFRrjATsb4gBpbj44enEiqNbcv+bC3Qo5sgGR4Dy3ZnTK//VBsZzn2EFhU # /z3RUhoYXSzZFl5bIDahghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG # 9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEE # oGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgVbWOve1QWJKA # NvIzeCdcbSv8BoH5UZRIMCODGpxDnKcCEQCP9PuexLDSG6jzZuQiStcXGA8yMDI0 # MDkyMDA2NTQxNVqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjAN # BgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs # IEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEy # NTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1 # OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYD # VQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQAD # ggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfc # YhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD # 1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd # /nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH # 13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk # 9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495u # ZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPT # aR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6F # aXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+ # uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRw # o+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMB # AAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s # BwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW2 # 7xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwz # LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1l # U3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhho # dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNl # cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZU # aW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xw # jU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt # 7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2 # V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJp # ddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqX # TzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3 # 701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNK # qDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7 # B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFG # hmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBc # YLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflr # LAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o # ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln # aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE # aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy # MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x # OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt # ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1 # BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z # nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ # Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6 # 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk # psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn # LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq # x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd # OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ # TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR # k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo # AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud # EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G # A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT # BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG # GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh # Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD # VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0 # VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9 # bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T # zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS # lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq # T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl # 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y # r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05 # et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um # AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe # Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr # 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC # JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga # oSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcN # AQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG # A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJl # ZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjEL # MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 # LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0 # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBp # M+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR # 0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0 # O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53 # yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4 # x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3Vd # eGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1C # doeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJh # besz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz # 0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNB # ERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+ # CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8w # HQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0 # ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGsw # JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcw # AoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElE # Um9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2Vy # dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYE # VR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqs # oYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPI # TtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZ # qPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/v # oVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+ # cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNy # AgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw # OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT # dGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAa # BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDky # MDA2NTQxNVowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnG # Txmcz0AwLwYJKoZIhvcNAQkEMSIEIJs5jJNTLYGJE1qq5bFTkAslwUyV1f57Jwab # d8jjO6O3MDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+C # itpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICABYW6gDIZXLcV+TOP/YO # wrvoXDuEhhyaOCYLqFV5G1FgQa6NyGKKRDXy+mtACpdblQG1dl7DBCEcy+vTiX9k # +qUpOgRWVnnoWu17n7gVFq5sC45iv9jQ1fkgmv2+sH/IAt607HAvBXqr4//5KZGV # kG9gh3dgs9wa1rssA4uWfgFxmXAFggUP8ROL7HOeHfOojPOx3gRtP7NLUn2j8Ktn # vH7FL80THAP+zVpA3ILhWC+jKqqC8enX/RXiz7KW02ixJg/hXikjbmZ8X9ErlwbP # pwx+RlCidnArVBV29D8uIrVBkxqWWuAzlWqikvdq9VLzXrk1YuZ0MfV35DEYDIqf # y/KA5HkVBOCRaWq04jaQupb6BYKzY7D2KTzzy2FjvmBnhA1HAoluAFMT+HqmZI9c # y9smXYs6Yza8gzkhiZAUgAv8QQQFn5nEiEBKlXmI456t6/DCfgc7KEq5Jf1IQC1j # 2aXNi6DjCJojbdBSaiMj5mWW+KDzbXEpzMS90+QoqO1/eRsioKnX+8Rl1F3Lktms # ObGvqNMa4BKk7wDWrTTuJrrm/XbtEb/HfsNcEo/TUE/nHVABWQwkseSy2X0cO/tO # hr8CgXRxStwmPcSo7jk0KKJRGUge76HLeGohjiOXvQqmFELfT4WrxFcy0AdiQSBk # TPXSICD6NLf7pAeXDD+asV8g # SIG # End signature block
combined_dataset/train/non-malicious/3119.ps1
3119.ps1
function Get-InstalledSoftware { [CmdletBinding()] param( [Parameter( Position=0, HelpMessage='Search for product name (You can use wildcards like "*ProductName*')] [String]$Search, [Parameter( Position=1, HelpMessage='ComputerName or IPv4-Address of the remote computer')] [String]$ComputerName = $env:COMPUTERNAME, [Parameter( Position=2, HelpMessage='Credentials to authenticate agains a remote computer')] [System.Management.Automation.PSCredential] [System.Management.Automation.CredentialAttribute()] $Credential ) Begin{ $LocalAddress = @("127.0.0.1","localhost",".","$($env:COMPUTERNAME)") [System.Management.Automation.ScriptBlock]$ScriptBlock = { return Get-ChildItem -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall", "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" | Get-ItemProperty | Select-Object -Property DisplayName, Publisher, UninstallString, InstallLocation, InstallDate } } Process{ if($LocalAddress -contains $ComputerName) { $Strings = Invoke-Command -ScriptBlock $ScriptBlock -ArgumentList $Search } else { if(Test-Connection -ComputerName $ComputerName -Count 2 -Quiet) { try { if($PSBoundParameters.ContainsKey('Credential')) { $Strings = Invoke-Command -ScriptBlock $ScriptBlock -ComputerName $ComputerName -ArgumentList $Search -Credential $Credential -ErrorAction Stop } else { $Strings = Invoke-Command -ScriptBlock $ScriptBlock -ComputerName $ComputerName -ArgumentList $Search -ErrorAction Stop } } catch { throw } } else { throw """$ComputerName"" is not reachable via ICMP!" } } foreach($String in $Strings) { if((-not([String]::IsNullOrEmpty($String.DisplayName))) -and (-not([String]::IsNullOrEmpty($String.UninstallString)))) { if((-not($PSBoundParameters.ContainsKey('Search'))) -or (($PSBoundParameters.ContainsKey('Search') -and ($String.DisplayName -like $Search)))) { [pscustomobject] @{ DisplayName = $String.DisplayName Publisher = $String.Publisher UninstallString = $String.UninstallString InstallLocation = $String.InstallLocation InstallDate = $String.InstallDate } } } } } End{ } }
combined_dataset/train/non-malicious/Event Log SOX audit.ps1
Event Log SOX audit.ps1
$s = "Server01", "Server02", "Server03" foreach($server in $s) {$server #$computername = Get-Content env:computername $filter_Security = '<QueryList> <Query Id="0" Path="Security"> <Select Path="Security">(*[System[Provider[@Name="Microsoft-Windows-Security-Auditing"] and (Task = 13824 or Task = 13825 or Task = 13826 or Task = 13827 or Task = 13828 or Task = 13829 or Task = 13568 or Task = 13569 or Task = 13570 or Task = 13571 or Task = 13572) or (Task = 12544 and (band(Keywords,4503599627370496)))]]) or (*[System[Provider[@Name="Microsoft-Windows-Eventlog"] and Task = 104]]) </Select></Query></QueryList>' $filter_AcctManagement = '<QueryList> <Query Id="0" Path="Security"> <Select Path="Security">*[System[Provider[@Name="Microsoft-Windows-Security-Auditing"] and (Task = 13824 or Task = 13825 or Task = 13826 or Task = 13827 or Task = 13828 or Task = 13829)]] </Select></Query></QueryList>' $filter_AuditPolicyChanges = '<QueryList> <Query Id="0" Path="Security"> <Select Path="Security">*[System[Provider[@Name="Microsoft-Windows-Security-Auditing"] and (Task = 13568 or Task = 13569 or Task = 13570 or Task = 13571 or Task = 13572 or Task = 13573)]] </Select></Query></QueryList>' $filter_FailedLogins = '<QueryList> <Query Id="0" Path="Security"> <Select Path="Security">*[System[Provider[@Name="Microsoft-Windows-Security-Auditing"] and (Task = 12544 and (band(Keywords,4503599627370496)))]] </Select></Query></QueryList>' $filter_AuditCleared = '<QueryList> <Query Id="0" Path="Security"> <Select Path="Security">*[System[Provider[@Name="Microsoft-Windows-Eventlog"] and Task = 104]] </Select></Query></QueryList>' $filter_RDP = '<QueryList> <Query Id="0" Path="Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational"> <Select Path="Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational">*[System[Provider[@Name="Microsoft-Windows-TerminalServices-RemoteConnectionManager"] and (EventID=1149)]] </Select></Query></QueryList>' Get-WinEvent -computername $server -FilterXml $filter_RDP | Export-Csv \\\\networkpath\\$server.RDP.csv Get-WinEvent -computername $server -FilterXml $filter_Security | Select-Object -Property 'Message','ID','Task','RecordID','LogName','ProcessID','ThreadID','MachineName','TimeCreated','TaskDisplayName' | Export-Csv \\\\networkpath\\$server.Security.csv
combined_dataset/train/non-malicious/2263.ps1
2263.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed.")] [ValidateNotNullOrEmpty()] [ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})] [string]$SiteServer, [parameter(Mandatory=$true, HelpMessage="Specify a Configuration Manager version that should be installed. Valid format is e.g. 1602 or 1606.")] [ValidateNotNullOrEmpty()] [ValidateScript({$_.Length -eq 4})] [string]$Version, [parameter(Mandatory=$false, HelpMessage="Specify how many times the script will check if an UpdatePackage is available for installation.")] [ValidateNotNullOrEmpty()] [int]$AvailabilityCheckCount = 120, [parameter(Mandatory=$false, HelpMessage="Specify how many times the script will check if the prerequisite checks has completed for an UpdatePackage.")] [ValidateNotNullOrEmpty()] [int]$PrerequisiteCheckCount = 120 ) Begin { try { Write-Verbose -Message "Determining Site Code for Site server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Verbose -Message "Site Code: $($SiteCode)" } } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { Write-Warning -Message "Unable to determine Site Code" ; break } } Process { $UpdateCheckCount = 0 $PrereqCheckCount = 0 $UpdatePackageAvailibility = $false $CMUpdatePackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_CM_UpdatePackages -ComputerName $SiteServer -Filter "(Name like 'Configuration Manager $($Version)%') AND (UpdateType = 0) AND (State != 196612)" -Verbose:$false if (($CMUpdatePackage | Measure-Object).Count -eq 1) { do { $UpdateCheckCount++ Write-Verbose -Message "Configuration Manager Servicing: Attempting to locate Update Package in SMS_CM_UpdatePackages matching 'Configuration Manager $($Version)'" $CMUpdatePackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_CM_UpdatePackages -ComputerName $SiteServer -Filter "(Name like 'Configuration Manager $($Version)%') AND (UpdateType = 0)" -Verbose:$false if ($CMUpdatePackage -eq $null) { Write-Verbose -Message "Configuration Manager Servicing ($($UpdateCheckCount) / $($AvailabilityCheckCount)): UpdatePackage was not found matching 'Configuration Manager $($Version)', sleeping for 30 seconds" } else { Write-Verbose -Message "Configuration Manager Servicing ($($UpdateCheckCount) / $($AvailabilityCheckCount)): UpdatePackage found, validating if $($CMUpdatePackage.Name.TrimEnd()) is ready for installation" switch ($CMUpdatePackage.State) { 327682 { Write-Verbose -Message "Configuration Manager Servicing ($($UpdateCheckCount) / $($AvailabilityCheckCount)): UpdatePackage state is Downloading, sleeping for 30 seconds" if ($UpdateCheckCount -eq $AvailabilityCheckCount) { Write-Verbose -Message "Configuration Manager Servicing ($($UpdateCheckCount) / $($AvailabilityCheckCount)): Downloading state detected for longer than $($AvailabilityCheckCount * 30 / 60) minutes, restarting SMS_EXECUTIVE service" if ($PSCmdlet.ShouldProcess("SMS_EXECUTIVE", "Restart")) { Restart-Service -Name "SMS_EXECUTIVE" -Force -Verbose:$false } $UpdateCheckCount = 0 } } 262146 { Write-Verbose -Message "Configuration Manager Servicing ($($UpdateCheckCount) / $($AvailabilityCheckCount)): UpdatePackage state is Available, attempting to initiate installation of $($CMUpdatePackage.Name.TrimEnd())" $UpdatePackageAvailibility = $true } } } if ($UpdatePackageAvailibility -eq $false) { Start-Sleep -Seconds 30 } } while ($CMUpdatePackage.State -ne 262146) Write-Verbose -Message "Configuration Manager Servicing: Starting prerequisite checks for $($CMUpdatePackage.Name.TrimEnd())" $CMUpdatePackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_CM_UpdatePackages -ComputerName $SiteServer -Filter "(Name like 'Configuration Manager $($Version)%') AND (UpdateType = 0)" -Verbose:$false if ($CMUpdatePackage -ne $null) { if ($PSCmdlet.ShouldProcess($CMUpdatePackage.Name.TrimEnd(), "Install")) { $CMUpdatePackage.UpdatePrereqAndStateFlags(0,2) | Out-Null } } do { $PrereqCheckCount++ if ($PrereqCheckCount -eq $PrerequisiteCheckCount) { Write-Verbose -Message "Configuration Manager Servicing ($($PrereqCheckCount) / $($PrerequisiteCheckCount)): Prerequisite checks has been in running state for $($PrerequisiteCheckCount * 30 / 60) min, restarting SMS_EXECUTIVE service" if ($PSCmdlet.ShouldProcess("SMS_EXECUTIVE", "Restart")) { Restart-Service -Name "SMS_EXECUTIVE" -Force -Verbose:$false } $PrereqCheckCount = 0 } else { Write-Verbose -Message "Configuration Manager Servicing ($($PrereqCheckCount) / $($PrerequisiteCheckCount)): Waiting for prerequisite checks to complete for $($CMUpdatePackage.Name.TrimEnd()), sleeping for 30 seconds" $CMUpdatePackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_CM_UpdatePackages -ComputerName $SiteServer -Filter "(Name like 'Configuration Manager $($Version)%') AND (UpdateType = 0)" -Verbose:$false Start-Sleep -Seconds 30 } } while ($CMUpdatePackage.State -ne 196609) Write-Verbose -Message "Configuration Manager Servicing: Installation was successfully initated for $($CMUpdatePackage.Name.TrimEnd()), for more details, review the CMUpdate.log" } elseif (($CMUpdatePackage | Measure-Object).Count -gt 1) { Write-Warning -Message "Query for Update Packages returned more than 1 instance, please define your search with a specific version" } else { Write-Warning -Message "Query for Update Packages did not return any instances" } }
combined_dataset/train/non-malicious/sample_40_34.ps1
sample_40_34.ps1
########################################################### # # 'ServiceHelper' module # ########################################################### $ErrorActionPreference = 'Stop' Set-StrictMode -Version Latest $global:GCServiceName = "GCService" $script:GCServiceBinaryName = "gc_service.exe" $script:GCServiceDisplayName = "Guest Configuration Service" $script:GCServiceDescription = "This service monitors desired state of the machine." $global:GCArcServiceName = "GCArcService" $script:GCArcServiceBinaryName = "gc_arc_service.exe" $script:GCArcServiceDisplayName = "Guest Configuration Arc Service" $script:GCArcServiceDescription = "This service monitors desired state of the machine." $global:ExtServiceName = "ExtensionService" $script:ExtServiceBinaryName = "gc_extension_service.exe" $script:ExtDisplayName = "Guest Configuration Extension service" $script:ExtDescription = "The service installs the requested extensions" $script:GCInstallPath = "$PSScriptRoot\..\..\.." $script:GCBinariesFolderName = "GC" $script:MigratedDataFolderName = "MigratedData" $script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName <# .SYNOPSIS Install GC Service. By default it calculates the GC Service Binary Path based on this GC Install Module location. .Example Install-ServiceInternal #> Function Install-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Install-ServiceInternal" if ($ServiceType -eq "GC" -and (CheckServiceExists($global:GCServiceName))) { Write-Error "GC service already exists, can not install new service" } elseif ($ServiceType -eq "Extension" -and (CheckServiceExists($global:ExtServiceName))) { Write-Error "Extension service already exists, can not install new service" } elseif ($ServiceType -eq "GCArc" -and (CheckServiceExists($global:GCArcServiceName))) { Write-Error "GC Arc service already exists, can not install new service" } else { # Default values for GC Azure Service $serviceName = $global:GCServiceName $serviceBinaryName = $script:GCServiceBinaryName $displayName = $script:GCServiceDisplayName $description = $script:GCServiceDescription if ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName $serviceBinaryName = $script:ExtServiceBinaryName $displayName = $script:ExtDisplayName $description = $script:ExtDescription } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName $serviceBinaryName = $script:GCArcServiceBinaryName $displayName = $script:GCArcServiceDisplayName $description = $script:GCArcServiceDescription } $serviceBinaryPath = Join-Path $script:GCBinariesPath $serviceBinaryName $absolutePath = [System.IO.Path]::GetFullPath($serviceBinaryPath) Write-Verbose -Message "GC Service binary path : $absolutePath." $serviceApplication = Get-Command -Name $absolutePath -TotalCount 1 if ($serviceApplication.CommandType -ne "Application") { Write-Error "Service binary type is not as expected" } $servicePathWithQuotes = '"{0}"' -f $absolutePath $serviceBinaryPathCommand = $servicePathWithQuotes + " -k netsvcs" New-Service -Name $serviceName -BinaryPathName $serviceBinaryPathCommand -DisplayName $displayName -Description $description -StartupType Automatic $command = "sc.exe config $ServiceName start= delayed-auto" $Output = Invoke-Expression -Command $Command -ErrorAction Stop if ($LASTEXITCODE -ne 0) { Write-Warning "Failed to set $ServiceName to delayed start. More details: $Output" } else { Write-Verbose "Successfully changed $ServiceName service to delayed start" } # For windows 2008 R2 + sp1 start-process with -Wait parameter does not work. Hence sleep for 10 sec instead. $osVersion=[Environment]::OSVersion.Version if (($osVersion.Major -eq 6) -and ($osVersion.Minor -eq 1) -and ($osVersion.Build -le 7601)) { # configure recovery of the service during failure. $configureProcess = Start-Process sc.exe -ArgumentList "failure $serviceName reset= 30 actions= restart/10000/restart/20000/restart/30000" -PassThru Start-Sleep -Seconds 10 } else { # configure recovery of the service during failure. $configureProcess = Start-Process sc.exe -ArgumentList "failure $serviceName reset=30 actions=restart/10000/restart/20000/restart/30000" -PassThru -Wait } if ($null -eq $configureProcess) { Write-Error "Failed to start sc.exe process to configure $serviceName service." } # on 2008R2 ExitCode is not set. if (($configureProcess.ExitCode -ne 0) -and ($null -ne $configureProcess.ExitCode)) { Write-Warning "configuring service recovery options failed with exit-code:- $($configureProcess.ExitCode)" } Write-Verbose -Message "Successfully Installed new $serviceName." } Write-Verbose -Message "Validating $serviceName Properties." # Validate service Properties as returend by Get-Service. $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Stopped') { Write-Verbose -Message "$serviceName is in Stopped State." } else { Write-Error -Message "$serviceName is in unexpected state: $($serviceObject.Status)" } if ($serviceObject.CanPauseAndContinue -eq $false) { Write-Verbose -Message "$serviceName has correct CanPauseAndContinue State." } else { Write-Error -Message "$serviceName has unexpected CanPauseAndContinue: $($serviceObject.CanPauseAndContinue)" } if ($serviceObject.CanShutdown -eq $false) { Write-Verbose -Message "$serviceName has correct CanShutdown State." } else { Write-Error -Message "$serviceName has unexpected CanShutdown: $($serviceObject.CanShutdown)" } if ($serviceObject.CanStop -eq $false) { Write-Verbose -Message "$serviceName has correct CanStop State." } else { Write-Error -Message "$serviceName has unexpected CanStop: $($serviceObject.CanStop)" } if ($serviceObject.ServiceType -eq "Win32OwnProcess") { Write-Verbose -Message "$serviceName will run as Win32OwnProcess." } else { Write-Error -Message "$serviceName has unexpected ServiceType: $($serviceObject.ServiceType)" } # For windows 2008 R2 + sp1 Get-Service cmdlet does not populate StartType if ($serviceObject.PSObject.Properties['StartType']) { if ($serviceObject.StartType -eq "Automatic") { Write-Verbose -Message "$serviceName will be started Automatically." } else { Write-Warning -Message "$serviceName has unexpected StartType: $($serviceObject.StartType)" } } else { # Configure recovery of the service during failure. We need to look for the value of the start type because the type will be localized based on # the language of the machine. Since we're only looking for one startType: '(DELAYED)' we can just search for that and assume that if we can't # find it then it is configured incorrectly. $ServiceStartType = ([string](sc.exe qc $serviceName | Select-String '(DELAYED)')).Split(' ',[System.StringSplitOptions]::RemoveEmptyEntries)[-1] if ($ServiceStartType -imatch '(DELAYED)') { Write-Verbose -Message "$serviceName will be started Automatically." } else { Write-Warning -Message "$serviceName has unexpected StartType or the StartType cannot be found on the object. StartType: $ServiceStartType" } } # Also validate some service properties from the registry database of scm. $serviceRegistryData = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName if ($serviceRegistryData.ImagePath -eq $serviceBinaryPathCommand) { Write-Verbose -Message "$serviceName Binary is Installed Correctly." } else { Write-Error -Message "$serviceName binary is not Installed correctly: $($serviceRegistryData.ImagePath)" } if ($serviceRegistryData.ObjectName -eq "LocalSystem") { Write-Verbose -Message "$serviceName will run under LocalSystem Account." } else { Write-Error -Message "$serviceName has unexpected AccountType: $($serviceRegistryData.ObjectName)" } if ($ServiceType -eq "GC") { if ($serviceRegistryData.DisplayName -eq $script:GCServiceDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:GCServiceDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } elseif ($ServiceType -eq "GCArc") { if ($serviceRegistryData.DisplayName -eq $script:GCArcServiceDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:GCArcServiceDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } elseif ($ServiceType -eq "Extension") { if ($serviceRegistryData.DisplayName -eq $script:ExtDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:ExtDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } } <# .Synopsis Get Guest Config data path. #> function Get-GuestConfigDataPath { [CmdletBinding()] param () return Join-Path $env:ProgramData 'GuestConfig' } <# .Synopsis Set Acl permissions on given path #> function Set-AclPermissions { [CmdletBinding()] Param ( [Parameter()] [string] $ServiceType, [Parameter()] [string] $Path ) try { Write-Verbose -Message "Attempting to set ACL permissions on the path '$Path' with PowerShell..." if ($ServiceType -eq 'GC') { Write-Verbose -Message "Using Get-Acl" $acl = Get-Acl $Path } else { # Ext deployment fails in azure with "[System.IO.DirectoryInfo] does not contain a method named 'GetAccessControl'" error # So we are calling this only for Hybrid scenarios. Write-Verbose -Message "Using Get-Item GetAccessControl" $acl = (Get-Item $Path).GetAccessControl('Access') } # Removing inherited access rules Write-Verbose -Message "Clearing existing ACL permissions" $acl.SetAccessRuleProtection($True, $False) # Adding new access rules for the target directory Write-Verbose -Message "Setting ACL permissions for the built-in Administrator" $BuiltinAdminSID = New-Object System.Security.Principal.SecurityIdentifier 'S-1-5-32-544' #Built-in Administrators SID $rule = New-Object System.Security.AccessControl.FileSystemAccessRule($BuiltinAdminSID, 'FullControl', 'ContainerInherit, ObjectInherit', 'None', 'Allow') $acl.AddAccessRule($rule) Set-Acl $Path $acl Write-Verbose -Message "Setting ACL permissions for the Local System" $BuiltinLocalSystemSID = New-Object System.Security.Principal.SecurityIdentifier 'S-1-5-18' #Local System SID $rule = New-Object System.Security.AccessControl.FileSystemAccessRule($BuiltinLocalSystemSID, 'FullControl', 'ContainerInherit, ObjectInherit', 'None', 'Allow') $acl.AddAccessRule($rule) Set-Acl $Path $acl Write-Verbose -Message "Suceeded setting ACL permissions with PowerShell" } catch { Write-Verbose -Message "Failed to set ACL permissions with PowerShell. Attempting with icacls..." # For windows 2008 R2 + sp1 start-process with -Wait parameter does not work. Hence sleep for 5 sec instead. $osVersion=[Environment]::OSVersion.Version if (($osVersion.Major -eq 6) -and ($osVersion.Minor -eq 1) -and ($osVersion.Build -le 7601)) { $processGrantAdminUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-32-544:(OI)(CI)F" -PassThru $processGrantLocalSystemUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-18:(OI)(CI)F" -PassThru Start-Sleep -Seconds 5 } else { $processGrantAdminUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-32-544:(OI)(CI)F" -PassThru -Wait $processGrantLocalSystemUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-18:(OI)(CI)F" -PassThru -Wait } if ($null -eq $processGrantAdminUserAccess) { Write-Error "Failed to start icacls.exe process to set Administrator user permission on $Path." } if ($null -eq $processGrantLocalSystemUserAccess) { Write-Error "Failed to start icacls.exe process to set LocalSystem user permission on $Path." } # on 2008R2 ExitCode is not set. if (($processGrantAdminUserAccess.ExitCode -ne 0) -and ($null -ne $processGrantAdminUserAccess.ExitCode)) { Write-Error "icacls.exe failed to set Administrator user permission on $Path. Exit code: $($processGrantAdminUserAccess.ExitCode)" } if (($processGrantLocalSystemUserAccess.ExitCode -ne 0) -and ($null -ne $processGrantLocalSystemUserAccess.ExitCode)) { Write-Error "icacls.exe failed to set LocalSystem user permission on $Path. Exit code: $($processGrantLocalSystemUserAccess.ExitCode)" } } } <# .SYNOPSIS Start the GC Service. Report Failure if service is not able to start. .Example Start-ServiceInternal #> Function Start-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Start-ServiceInternal" if ($ServiceType -eq "GC") { $serviceName = $global:GCServiceName } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName } elseif ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName } # Start GC Timer Service, may be retry on failure. Start-Service $serviceName $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Running') { Write-Verbose -Message "$serviceName is running." } else { Write-Error "$serviceName can not be started." } } <# .SYNOPSIS Stop the GC service and then uninstall it. .Example Uninstall-ServiceInternal #> Function Uninstall-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Uninstall-ServiceInternal" if ($ServiceType -eq "GC") { $serviceName = $global:GCServiceName } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName } elseif ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName } # Unregister GC Service $timeOut = [timespan]::FromMinutes(5) $stopRetry = [DateTime]::Now.Add($timeOut) $secondsBetweenRetry = 3 Stop-Service $serviceName -ErrorAction SilentlyContinue -ErrorVariable stopTimeError if (Get-Service $serviceName -ErrorAction SilentlyContinue) { if (Get-Service -Name $serviceName -ErrorAction SilentlyContinue) { while (((Get-Service -Name $serviceName).Status -ne 'Stopped') -and ([dateTime]::Now -le $stopRetry)) { Write-Verbose "Wait for service to stop" -Verbose Start-Sleep -Seconds $secondsBetweenRetry } } $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Stopped') { Write-Verbose -Message "$serviceName is stopped." sc.exe delete $serviceName } else { Write-Error "$serviceName can not be Uninstalled because we are not able to stop it." } } else { Write-Verbose "Service already stopped" -Verbose } # some basic validation to check service is Uninstalled. $serviceRegistryExists = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName -ErrorAction SilentlyContinue if ($serviceRegistryExists -ne $null) { # sometimes the registry clean up does not happen right away. Hence do retry for the check. while (($serviceRegistryExists -ne $null) -and ([dateTime]::Now -le $stopRetry)) { Start-Sleep -Seconds $secondsBetweenRetry $serviceRegistryExists = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName -ErrorAction SilentlyContinue } # if service registry entry still exist. if ($serviceRegistryExists -ne $null) { Write-Error "$serviceName is not Uninstalled correctly. Information is Present in Registry Database." } } $getService = Get-Service $serviceName -ErrorAction SilentlyContinue if ($getService -ne $null) { Write-Error "$serviceName is not Uninstalled correctly. Service is reporting status." } } Function CheckServiceExists { [CmdletBinding()] Param( [Parameter()] [string] $ServiceName = $global:GCServiceName ) if (Get-Service $serviceName -ErrorAction SilentlyContinue) { return $true } return $false } function Invoke-ScriptWithRetry { [CmdletBinding()] param( [Parameter(Mandatory = $true, Position = 0)] [ScriptBlock] $Script = {}, [Parameter()] [int] $RetryCount = 3 ) $results = $null $exceptionObject = $null $keepRetrying = $true Write-Verbose "Invoke-ScriptWithRetry:: Start time : $((Get-Date).ToString())" for($i = 0; (($i -lt $RetryCount) -and ($keepRetrying -eq $true)); $i++) { try { $exceptionObject = $null $results = Invoke-Command -ScriptBlock $Script $keepRetrying = $false } catch { Write-Verbose "Retry Count $i" Write-Warning "$_" $exceptionObject = $_ } try { # Processor utilization $processorObj = Get-WmiObject -Class win32_processor -ErrorAction SilentlyContinue if($processorObj -ne $null) { $cpuUsage = ($processorObj | Measure-Object -Property LoadPercentage -Average | Select-Object Average).Average Write-Verbose "CPU Usage : '$($cpuUsage)%'" } # Memory utilization $computerMemory = Get-WmiObject -Class win32_operatingsystem -ErrorAction SilentlyContinue if($computerMemory -ne $null) { $memory = ((($computerMemory.TotalVisibleMemorySize - $computerMemory.FreePhysicalMemory)*100)/ $computerMemory.TotalVisibleMemorySize) Write-Verbose "Memory Usage : '$($memory)%'" } } catch { Write-Warning "Failed to compute Memory/CPU usage. Error : $_" } } Write-Verbose "Invoke-ScriptWithRetry:: End time : $((Get-Date).ToString())" if($exceptionObject -ne $null) { throw $exceptionObject } return $results } # SIG # Begin signature block # MIInwQYJKoZIhvcNAQcCoIInsjCCJ64CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBI071bx7Qv02kc # Weh4vvZKzNcnYWFqPkN3/xZky5fV4aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMssvOiwDaWmswar3r1SHuBO # B1NIyHWOe9fjKR9gTfsZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAurqLR9T6TfXUUnbq0D8DlgzSkRKjA5KISDa2f0PwZG+KSm0utU/3cM0s # PZSIBF3ZaxG5wMQwXGiw+IDYGdcuUWpQuemVCZGkB9E6fkiVg1T58GuT2PASswuz # YQ/VDgV9MJdQ/m825LHBDPlFeQjM1vZfFOlphiyJljCFooSKFdhiqAm2VXGU/xDS # 7CSU7W9/BKJxw65rwTy6DKXnZWu4pv3nfjJhfmYspRiV9wwoOI5X4pZRGCEThHH1 # UmTMPx7N1mpCHY7RyZFnaKIFWER1PM41UiS5YvSwgzG1Axa67dvjw73TlR10T7AN # oxkK6BMxpzeFla9lKidN2Lnr22LGYqGCFyswghcnBgorBgEEAYI3AwMBMYIXFzCC # FxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDZ40uAzAE4DAso5cMHK4iVkMJ+i5WF6TROLzjWaY9kXAIGZh+1nZVb # GBMyMDI0MDQxNzE0NDMyNS42MzlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRejCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC # OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x # sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb # aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb # 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy # S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS # 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU # bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9 # TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp # TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa # GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu # h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+ # XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg # dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI # gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr # uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld # mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd # qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa # 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL # 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC # +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg # jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL # sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH # N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6 # bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtYwggI/AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy # QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnKNBowIhgPMjAyNDA0MTcxOTQyMThaGA8yMDI0MDQxODE5NDIxOFowdjA8Bgor # BgEEAYRZCgQBMS4wLDAKAgUA6co0GgIBADAJAgEAAgELAgH/MAcCAQACAhFkMAoC # BQDpy4WaAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA # AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAF1WisB0cR9AyQv/J # Y9A0crhFLTFtPTWGC+QzXEYDXcHXsTejw/zcgHDaKqvk9rBXVrWTVR11ZMe5+u90 # Eo8jZiObO96B456eYQOh7taEH7dsR9RryPR8+HtIRuQzZUYBYtxQVDe0rmE41bDT # X4geLj0amKQ02niEfK0F5Bgil+ExggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAd6eSJ6WnyhEPQABAAAB3jANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCBAuJ7Bo3rFIuswnP/iBDyzTpNPhF8IzwDFefV1MBcGIjCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EII4+I58NwV4QEEkCf+YLcyCtPnD9TbPzUtgPjgdz # fh17MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHe # nkielp8oRD0AAQAAAd4wIgQg59tlvKOhdJjBhInmVU5mphc6xzdlbZCC+bEf3kLZ # JvUwDQYJKoZIhvcNAQELBQAEggIAj2o14Rb8K84RB+bNOWtLBH5xJ8EMr878c8tL # ZuBJkMV52IVp0/m7NHyGbanRJKjwByW2RimmAP+5M/RiF5Wd9VtsOwb+61sylwZg # +94zt/3y9Lcfht2y3gmTjnR+qpSHip5UDajQchdbcO1iCBuXeSzNIZ5xPB+WIM/D # yyfpwtJL4Jeqvdb93P3YKT1fTimayCQQ/L9I0IzPbd+i3qJWZyid3AF4lXw+JK8D # icWPAa0qGUqklRYdv1drdrZtpD+TlaRB8xGYgDUpZF00dzQ6oXBeHltI0m1hl7E0 # GKZaIiRPZoblvc3fzxN+Q2Az+TihdKERarDtnEsN/T4+PP3kVWCFpor6eceo5Fr5 # GL6YCIeccZbkWnybW4SiQjg2JbdVVZhqagc60i4fsasY+Cn7zbm/Q7glzB0b6Bri # a+kyE2Lz8Ev+dLuqvPwkJiAhVXAb9PqcfPk/gN5iVUZcI0fOCcnj33Va3cQyHPbT # WT9P3vXftR/zkboG+IHZ2wc8xYYdxO6n5ywiOB94KqAeN491zQy0ys7hdB6ZkruA # WPDuTNIzsvhtxIwhhY7VnrbRcp4o5tT82eMCA7cgbUuxXdBe8AKdDqQKtdYUi1nf # EuYRzcBbVKV0bGWhLHuVl9/URmcQzZzQXYtgc+xOHziyBTNRw4a4qI0+lktWzrH8 # VmmRvNM= # SIG # End signature block
combined_dataset/train/non-malicious/sample_23_26.ps1
sample_23_26.ps1
parameters: - name: channel type: string default: 1.77 - name: targets default: [] type: object # Todo: use 1ES pipeline once extension is installed in ADO steps: - task: RustInstaller@1 inputs: rustVersion: ms-${{ parameters.channel }} cratesIoFeedOverride: $(CARGO_REGISTRY) additionalTargets: ${{ join(' ', parameters.targets) }} toolchainFeed: https://pkgs.dev.azure.com/monacotools/Monaco/_packaging/vscode/nuget/v3/index.json default: true addToPath: true displayName: Install MSFT Rust condition: and(succeeded(), ne(variables['CARGO_REGISTRY'], 'none')) - powershell: | . build/azure-pipelines/win32/exec.ps1 Invoke-WebRequest -Uri "https://win.rustup.rs" -Outfile $(Build.ArtifactStagingDirectory)/rustup-init.exe exec { $(Build.ArtifactStagingDirectory)/rustup-init.exe -y --profile minimal --default-toolchain $env:RUSTUP_TOOLCHAIN --default-host x86_64-pc-windows-msvc } echo "##vso[task.prependpath]$env:USERPROFILE\.cargo\bin" env: RUSTUP_TOOLCHAIN: ${{ parameters.channel }} displayName: Install OSS Rust condition: and(succeeded(), eq(variables['CARGO_REGISTRY'], 'none')) - powershell: | . build/azure-pipelines/win32/exec.ps1 exec { rustup default $RUSTUP_TOOLCHAIN } exec { rustup update $RUSTUP_TOOLCHAIN } env: RUSTUP_TOOLCHAIN: ${{ parameters.channel }} displayName: "Set Rust version" condition: and(succeeded(), eq(variables['CARGO_REGISTRY'], 'none')) - ${{ each target in parameters.targets }}: - script: rustup target add ${{ target }} displayName: "Adding Rust target '${{ target }}'" condition: and(succeeded(), eq(variables['CARGO_REGISTRY'], 'none')) - powershell: | . build/azure-pipelines/win32/exec.ps1 exec { rustc --version } exec { cargo --version } displayName: "Check Rust versions"
combined_dataset/train/non-malicious/NFSMountUsingReference.ps1
NFSMountUsingReference.ps1
################################################################################################################ # VMWare Standard Scripts - PowerCLI # # Purpose: Mount NFS datastore on new host server using reference host datstore # Author: David Chung # Docs: NA # Date: 2/4/2012 # # # Instruction: Enter VI server name, Reference Host server name # Modify $hostincluster value either $true or $false # $false value will only update single ESX host server with NFS mount # ################################################################################################################ $HostinCluster = $false $viserver = Read-Host "Enter VI server" $refhost = Read-Host "Enter Reference host server" Connect-VIServer $viserver $REFHOST = Get-VMHost $refhost If ($HostinCluster) { $cluster = Read-Host "Enter Cluster that has new host servers" $NEWHosts = Get-Cluster $cluster | Get-VMHost | sort name foreach($nfs in (Get-VMhost $REFHOST | Get-Datastore | Where {$_.type -eq "NFS"} )){ [string]$remotePath = $nfs.extensiondata.info.nas.remotepath [string]$remoteHost = $nfs.extensiondata.info.nas.remotehost [string]$shareName = $nfs.Name Foreach ($NEWHost in $NEWHosts) { If ((Get-VMHost $NEWHOST | Get-Datastore | Where {$_.Name -eq $shareName -and $_.type -eq "NFS"} -ErrorAction SilentlyContinue )-eq $null){ Write-Host "NFS mount $shareName doesn't exist on $($NEWHOST.name)" -fore Red New-Datastore -Nfs -VMHost $NEWHost.name -Name $Sharename -Path $remotePath -NfsHost $remoteHost | Out-Null } } } } Else { $NEWHOST = Read-Host "Enter new host name" $Newhost = Get-VMHost $NEWHost foreach($nfs in ($REFHOST | Get-Datastore | Where {$_.type -eq "NFS"} )){ [string]$remotePath = $nfs.extensiondata.info.nas.remotepath [string]$remoteHost = $nfs.extensiondata.info.nas.remotehost [string]$shareName = $nfs.Name If (($NEWHOST | Get-Datastore | Where {$_.Name -eq $shareName -and $_.type -eq "NFS"} -ErrorAction SilentlyContinue )-eq $null){ Write-Host "NFS mount $shareName doesn't exist on $($NEWHOST.name)" -fore Red New-Datastore -Nfs -VMHost $NEWHost.name -Name $Sharename -Path $remotePath -NfsHost $remoteHost | Out-Null } } }
combined_dataset/train/non-malicious/1403.ps1
1403.ps1
function Test-CPerformanceCounterCategory { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $CategoryName ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState return [Diagnostics.PerformanceCounterCategory]::Exists( $CategoryName ) }
combined_dataset/train/non-malicious/3546.ps1
3546.ps1
function Create-VM( [string] $resourceGroupName, [string] $location, [int] $nick = 0) { $suffix = $(Get-RandomSuffix 5) + $nick $vmName = "PSTestVM" + $suffix $vm = Get-AzVM -ResourceGroupName $resourceGroupName -Name $vmName -ErrorAction Ignore if ($vm -eq $null) { $subnetConfigName = "PSTestSNC" + $suffix $subnetConfig = New-AzVirtualNetworkSubnetConfig -Name $subnetConfigName -AddressPrefix 192.168.1.0/24 $vnetName = "PSTestVNET" + $suffix $vnet = New-AzVirtualNetwork -ResourceGroupName $resourceGroupName -Location $location ` -Name $vnetName -AddressPrefix 192.168.0.0/16 -Subnet $subnetConfig -Force $pipName = "pstestpublicdns" + $suffix $pip = New-AzPublicIpAddress -ResourceGroupName $resourceGroupName -Location $location ` -AllocationMethod Static -IdleTimeoutInMinutes 4 -Name $pipName -Force $nsgRuleRDPName = "PSTestNSGRuleRDP" + $suffix $nsgRuleRDP = New-AzNetworkSecurityRuleConfig -Name $nsgRuleRDPName -Protocol Tcp ` -Direction Inbound -Priority 1000 -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix * ` -DestinationPortRange 3389 -Access Allow $nsgRuleWebName = "PSTestNSGRuleWeb" + $suffix $nsgRuleWeb = New-AzNetworkSecurityRuleConfig -Name $nsgRuleWebName -Protocol Tcp ` -Direction Inbound -Priority 1001 -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix * ` -DestinationPortRange 80 -Access Allow $nsgName = "PSTestNSG" + $suffix $nsg = New-AzNetworkSecurityGroup -ResourceGroupName $resourceGroupName -Location $location ` -Name $nsgName -SecurityRules $nsgRuleRDP,$nsgRuleWeb -Force $nicName = "PSTestNIC" + $suffix $nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $resourceGroupName -Location $location ` -SubnetId $vnet.Subnets[0].Id -PublicIpAddressId $pip.Id -NetworkSecurityGroupId $nsg.Id -Force $UserName='demouser' $PasswordString = $(Get-RandomSuffix 12) $Password=$PasswordString| ConvertTo-SecureString -Force -AsPlainText $Credential=New-Object PSCredential($UserName,$Password) $vmConfig = New-AzVMConfig -VMName $vmName -VMSize Standard_D1 | ` Set-AzVMOperatingSystem -Windows -ComputerName $vmName -Credential $Credential | ` Set-AzVMSourceImage -PublisherName MicrosoftWindowsServer -Offer WindowsServer ` -Skus 2016-Datacenter -Version latest | Add-AzVMNetworkInterface -Id $nic.Id New-AzVM -ResourceGroupName $resourceGroupName -Location $location -VM $vmConfig | Out-Null $vm = Get-AzVM -ResourceGroupName $resourceGroupName -Name $vmName } return $vm } function Create-UnmanagedVM( [string] $resourceGroupName, [string] $location, [string] $saname, [int] $nick = 0) { $suffix = $(Get-RandomSuffix 5) + $nick $vmName = "PSTestVM" + $suffix $vm = Get-AzVM -ResourceGroupName $resourceGroupName -Name $vmName -ErrorAction Ignore if ($vm -eq $null) { $subnetConfigName = "PSTestSNC" + $suffix $subnetConfig = New-AzVirtualNetworkSubnetConfig -Name $subnetConfigName -AddressPrefix 192.168.1.0/24 $vnetName = "PSTestVNET" + $suffix $vnet = New-AzVirtualNetwork -ResourceGroupName $resourceGroupName -Location $location ` -Name $vnetName -AddressPrefix 192.168.0.0/16 -Subnet $subnetConfig -Force $pipName = "pstestpublicdns" + $suffix $pip = New-AzPublicIpAddress -ResourceGroupName $resourceGroupName -Location $location ` -AllocationMethod Static -IdleTimeoutInMinutes 4 -Name $pipName -Force $nsgRuleRDPName = "PSTestNSGRuleRDP" + $suffix $nsgRuleRDP = New-AzNetworkSecurityRuleConfig -Name $nsgRuleRDPName -Protocol Tcp ` -Direction Inbound -Priority 1000 -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix * ` -DestinationPortRange 3389 -Access Allow $nsgRuleWebName = "PSTestNSGRuleWeb" + $suffix $nsgRuleWeb = New-AzNetworkSecurityRuleConfig -Name $nsgRuleWebName -Protocol Tcp ` -Direction Inbound -Priority 1001 -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix * ` -DestinationPortRange 80 -Access Allow $nsgName = "PSTestNSG" + $suffix $nsg = New-AzNetworkSecurityGroup -ResourceGroupName $resourceGroupName -Location $location ` -Name $nsgName -SecurityRules $nsgRuleRDP,$nsgRuleWeb -Force $nicName = "PSTestNIC" + $suffix $nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $resourceGroupName -Location $location ` -SubnetId $vnet.Subnets[0].Id -PublicIpAddressId $pip.Id -NetworkSecurityGroupId $nsg.Id -Force $UserName='demouser' $PasswordString = $(Get-RandomSuffix 12) $Password=$PasswordString| ConvertTo-SecureString -Force -AsPlainText $Credential=New-Object PSCredential($UserName,$Password) $vmsize = "Standard_D1" $vm = New-AzVMConfig -VMName $vmName -VMSize $vmSize $pubName = "MicrosoftWindowsServer" $offerName = "WindowsServer" $skuName = "2016-Datacenter" $vm = Set-AzVMOperatingSystem -VM $vm -Windows -ComputerName $vmName -Credential $Credential $vm = Set-AzVMSourceImage -VM $vm -PublisherName $pubName -Offer $offerName -Skus $skuName -Version "latest" $vm = Add-AzVMNetworkInterface -VM $vm -Id $NIC.Id $sa = Get-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $saname $diskName = "mydisk" $OSDiskUri = $sa.PrimaryEndpoints.Blob.ToString() + "vhds/" + $diskName? + ".vhd" $vm = Set-AzVMOSDisk -VM $vm -Name $diskName -VhdUri $OSDiskUri -CreateOption fromImage New-AzVM -ResourceGroupName $resourceGroupName -Location $location -VM $vm | Out-Null } return $vm } function Create-GalleryVM( [string] $resourceGroupName, [string] $location, [int] $nick = 0) { $suffix = $(Get-RandomSuffix 5) + $nick $vmName = "PSTestGVM" + $suffix $vm = Get-AzVM -ResourceGroupName $resourceGroupName -Name $vmName -ErrorAction Ignore if ($vm -eq $null) { $subnetConfigName = "PSTestSNC" + $suffix $vnetName = "PSTestVNET" + $suffix $pipName = "pstestpublicdns" + $suffix $nsgName = "PSTestNSG" + $suffix $dnsLabel = "pstestdnslabel" + "-" + $suffix $UserName='demouser' $PasswordString = $(Get-RandomSuffix 12) $Password=$PasswordString| ConvertTo-SecureString -Force -AsPlainText $Credential=New-Object PSCredential($UserName,$Password) $vm = New-AzVm ` -ResourceGroupName $resourceGroupName ` -Name $vmName ` -Location $location ` -SubnetName $subnetConfigName ` -SecurityGroupName $nsgName ` -PublicIpAddressName $pipName ` -ImageName "MicrosoftWindowsServer:WindowsServer:2012-R2-Datacenter:latest" ` -Credential $Credential ` -DomainNameLabel $dnsLabel } return $vm } function Cleanup-ResourceGroup( [string] $resourceGroupName) { $resourceGroup = Get-AzResourceGroup -Name $resourceGroupName -ErrorAction Ignore if ($resourceGroup -ne $null) { $vaults = Get-AzRecoveryServicesVault -ResourceGroupName $resourceGroupName foreach ($vault in $vaults) { Delete-Vault $vault } Remove-AzResourceGroup -Name $resourceGroupName -Force } } function Delete-Vault($vault) { $containers = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType AzureVM foreach ($container in $containers) { $items = Get-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -Container $container ` -WorkloadType AzureVM foreach ($item in $items) { Disable-AzRecoveryServicesBackupProtection ` -VaultId $vault.ID ` -Item $item ` -RemoveRecoveryPoints -Force } } Remove-AzRecoveryServicesVault -Vault $vault } function Start-TestSleep($milliseconds) { if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback) { Start-Sleep -Milliseconds $milliseconds } } function Enable-Protection( $vault, $vm, [string] $resourceGroupName = "") { Start-TestSleep 5000 $container = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType AzureVM ` -FriendlyName $vm.Name; if($resourceGroupName -eq "") { $resourceGroupName = $vm.ResourceGroupName } if ($container -eq $null) { $policy = Get-AzRecoveryServicesBackupProtectionPolicy ` -VaultId $vault.ID ` -Name "DefaultPolicy"; Enable-AzRecoveryServicesBackupProtection ` -VaultId $vault.ID ` -Policy $policy ` -Name $vm.Name ` -ResourceGroupName $resourceGroupName | Out-Null $container = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType AzureVM ` -FriendlyName $vm.Name; } $item = Get-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -Container $container ` -WorkloadType AzureVM ` -Name $vm.Name return $item }
combined_dataset/train/non-malicious/Get-ChildItemProxy.ps1
Get-ChildItemProxy.ps1
Function Get-ChildItemProxy { [CmdletBinding(DefaultParameterSetName='Items', SupportsTransactions=$true)] param( [Parameter(ParameterSetName='Items', Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [System.String[]] ${Path}, [Parameter(ParameterSetName='LiteralItems', Mandatory=$true, Position=0, ValueFromPipelineByPropertyName=$true)] [Alias('PSPath')] [System.String[]] ${LiteralPath}, [Parameter(Position=1)] [System.String] ${Filter}, [System.String[]] ${Include}, [System.String[]] ${Exclude}, [Switch] ${Recurse}, [Switch] ${Force}, [Switch] ${Name}, [Switch] ${ContainersOnly}, [Switch] ${NoContainersOnly} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer) -and $outBuffer -gt 1024) { $PSBoundParameters['OutBuffer'] = 1024 } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand('Get-ChildItem', [System.Management.Automation.CommandTypes]::Cmdlet) if ($ContainersOnly) { [Void]$PSBoundParameters.Remove("ContainersOnly") $scriptCmd = {& $wrappedCmd @PSBoundParameters | Where-Object {$_.PSIsContainer -eq $true}} } elseif ($NoContainersOnly) { [Void]$PSBoundParameters.Remove("NoContainersOnly") $scriptCmd = {& $wrappedCmd @PSBoundParameters | Where-Object {$_.PSIsContainer -eq $false}} } { $scriptCmd = {& $wrappedCmd @PSBoundParameters } } $steppablePipeline = $scriptCmd.GetSteppablePipeline() $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } <# .ForwardHelpTargetName Get-ChildItem .ForwardHelpCategory Cmdlet #> }
combined_dataset/train/non-malicious/4112.ps1
4112.ps1
Set-Variable -Name FileName -Scope Global -Force Set-Variable -Name Log -Scope Global -Force Function DeleteLogFiles { Set-Variable Count -Scope Local -Force Set-Variable Files -Scope Local -Force Set-Variable i -Scope Local -Force $Months = @("Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec") $Files = Get-ChildItem $Global:Log -Filter "*.log" $Count = $Files.Count If ($Count -ne 0) { For ($i=0; $i -le $Count; $i++) { For ($j=0; $j -le $Months.Count; $j++) { $Month = "-"+$Months[$j]+"-" $a = $Files[$i] -match $Month If ($a -eq $true) { $File = $Global:Log + "\" + $Files[$i] If (Test-Path $File) { Remove-Item -Path $File -Force } } } } } $File = $Global:Log + "\NotRebooted.log" If (Test-Path $File) { Remove-Item -Path $File -Force } Remove-Variable Count -Scope Local -Force Remove-Variable Files -Scope Local -Force Remove-Variable i -Scope Local -Force } Function NewLogFile { $FileName = "NotRebooted.log" $Log = $Env:windir + "\Logs" New-Item -Path $Log -Name $FileName -ItemType File -Force } cls DeleteLogFiles NewLogFile Restart-Computer -ComputerName localhost -Force
combined_dataset/train/non-malicious/2106.ps1
2106.ps1
Describe "Native streams behavior with PowerShell" -Tags 'CI' { $powershell = Join-Path -Path $PsHome -ChildPath "pwsh" Context "Error stream" { $error.Clear() $command = [string]::Join('', @( '[Console]::Error.Write(\"foo`n`nbar`n`nbaz\"); ', '[Console]::Error.Write(\"middle\"); ', '[Console]::Error.Write(\"foo`n`nbar`n`nbaz\")' )) $out = & $powershell -noprofile -command $command 2>&1 It 'should not add records to $error variable' { $error.Count | Should -Be 9 } It 'uses ErrorRecord object to return stderr output' { ($out | Measure-Object).Count | Should -BeGreaterThan 1 $out[0] | Should -BeOfType 'System.Management.Automation.ErrorRecord' $out[0].FullyQualifiedErrorId | Should -Be 'NativeCommandError' $out | Select-Object -Skip 1 | ForEach-Object { $_ | Should -BeOfType 'System.Management.Automation.ErrorRecord' $_.FullyQualifiedErrorId | Should -Be 'NativeCommandErrorMessage' } } It 'uses correct exception messages for error stream' { ($out | Measure-Object).Count | Should -Be 9 $out[0].Exception.Message | Should -BeExactly 'foo' $out[1].Exception.Message | Should -BeExactly '' $out[2].Exception.Message | Should -BeExactly 'bar' $out[3].Exception.Message | Should -BeExactly '' $out[4].Exception.Message | Should -BeExactly 'bazmiddlefoo' $out[5].Exception.Message | Should -BeExactly '' $out[6].Exception.Message | Should -BeExactly 'bar' $out[7].Exception.Message | Should -BeExactly '' $out[8].Exception.Message | Should -BeExactly 'baz' } It 'preserves error stream as is with Out-String' { ($out | Out-String).Replace("`r", '') | Should -BeExactly "foo`n`nbar`n`nbazmiddlefoo`n`nbar`n`nbaz`n" } It 'does not get truncated or split when redirected' { $longtext = "0123456789" while ($longtext.Length -lt [console]::WindowWidth) { $longtext += $longtext } pwsh -c "& { [Console]::Error.WriteLine('$longtext') }" 2>&1 > $testdrive\error.txt $e = Get-Content -Path $testdrive\error.txt $e.Count | Should -Be 1 $e | Should -BeExactly $longtext } } } Describe 'piping powershell objects to finished native executable' -Tags 'CI' { It 'doesn''t throw any exceptions, when we are piping to the closed executable' { 1..3 | ForEach-Object { Start-Sleep -Milliseconds 100 @{'a' = 'b'} } | testexe -echoargs | Should -BeNullOrEmpty } }
combined_dataset/train/non-malicious/Backup Rotation (7zip).ps1
Backup Rotation (7zip).ps1
First file RotateBackups_MasterList.txt RowNbr,BackupName,VersionsRetained,BackupType 1,TargetBackup,2,Folder 2,LstDefBackup,5,File 3,XMLBackup,3,File 4,SourceBackup,2,Folder 5,TXTBackup,8,File Second file RotateBackups_FolderList.txt RowNbr,BackupName,FolderName 1,TargetBackup,c:\\MyBooks\\target 2,SourceBackup,c:\\MyBooks\\source Third file RotateBackups_FileExtensions.txt RowNbr,BackupName,FileExtension,FolderLoc 1,LstDefBackup,*.def,c:\\MyBooks\\target 2,LstDefBackup,*.lst,c:\\MyBooks\\target 3,XMLBackup,*.xml,c:\\MyBooks\\target 4,TXTBackup,*.txt,c:\\MyBooks\\rfiles When executed, files are created in c:\\Zipfiles that have a name associated with the BackupName, a batch date-time. BackupName files are counted & compared to VersionsRetained value, and excess ones (oldest first) are marked for deletion upon next run of script. Can specify a delete to recycle bin (default) or a destructive delete of the backup. Use at your own risk. Script: function create-7zip([String] $aDirectory, [String] $aZipfile){ [string]$pathToZipExe = "C:\\Program Files\\7-zip\\7z.exe"; [Array]$arguments = "a", "-tzip", "$aZipfile", "$aDirectory", "-r"; & $pathToZipExe $arguments; } # Call it by using: #create-7zip "c:\\temp\\myFolder" "c:\\temp\\myFolder.zip" #************************************************************************************ #************************************************************************************ # Initialize variables $zipFolder = "C:\\ZipFiles" $nameConv = "{0:yyyyMMdd_HHmmss}" -f (Get-Date) + ".zip" $fileList = @{} $FileCountArray = @() $bkupTypeArr = @() $myDocFolder = "c:\\Documents and Settings\\MyPC\\My Documents\\" # Import text files for master, folder and file backup information $bkupRotateMasterArr = Import-Csv $myDocFolder"RotateBackups_MasterList.txt" $fldrBkupArray = Import-Csv $myDocFolder"RotateBackups_FolderList.txt" $fileExtBkupArr = Import-Csv $myDocFolder"RotateBackups_FileExtensions.txt" # Switch to delete Item or to send to recycle bin # delete is destructive and cannot recover file. # Recycle setting removes file from folder, but sends to recycle bin # and can be restored if needed. # Must be either "Kill" or "Recycle" $KillOrRecycle = "Recycle" #************************************************************************************ #************************************************************************************ # Load contents of master backup array $bkup_Counts = @{} $b = $null foreach($b in $bkupRotateMasterArr) { $bkup_Counts[$b.BackupName] = $b.VersionsRetained } #set Backup Types from the array we just defined $type = $null foreach ($type in $bkup_Counts.Keys) { $bkupTypeArr += $type } #create array of our filenames for this batch $type = $null $fArray = @{} foreach ($type in $bkupRotateMasterArr) { $fArray[$type.BackupName] = ($type.BackupName + $nameConv) } # if extension array not null, get list of files to back up if ($fileExtBkupArr) { # Gather the list of files to be backed up $f = $null foreach ($f in $fileExtBkupArr) { $arr = @() $arr = (Get-ChildItem $f.FolderLoc -Recurse -Include $f.FileExtension | Select-Object fullname) foreach ($a in $arr) { if ($a) { $fileList[$a] = $f.BackupName } # if $a not null } # end inner foreach } # end outer foreach } # if FileExtension Backup Array not null # if filelist count gt zero, then create zip file of them for appropriate backup if ($fileList.Count -gt 0) { # must have entries in hashtable $f = $null #Loop thru file list & associate file with the appropriate backup foreach ($f in $fileList.Keys) { $arcFile = $null if ($fileList.ContainsKey($f)) { if ($fArray.ContainsKey($fileList[$f])) { $arcFile = $fArray[$fileList[$f]] create-7zip $f.FullName $zipFolder\\$arcFile } #if key in fArray } # if key in Filelist } # end foreach } # if hastable not empty # if folder backup not null then back up folders if ($fldrBkupArray) { # check if array not null (no entries) $f = $null #Backup Folders now foreach ($f in $fldrBkupArray) { $arcFldr = $null #if ($fArray.ContainsKey($f[1])) { if ($fArray.ContainsKey($f.BackupName)) { $arcFldr = $fArray[$f.BackupName] create-7zip $f.FolderName $zipFolder\\$arcFldr } #end if } # end foreach } # end if $fldrBkupArray not null # if 7zip succeeded, we'll continue if ($LASTEXITCODE -gt 0) {Throw "7Zip failed" } ELSE { # if Exitcode = 0 then continue with job # Remove any files with Archive bit = False # we marked it for deletion in previous run Add-Type -AssemblyName Microsoft.VisualBasic $files=get-childitem -path $zipFolder # we'll delete all files that don't have the archive bit set Foreach($file in $files) { If((Get-ItemProperty -Path $file.fullname).attributes -band [io.fileattributes]::archive) { Write-output "$file is set to be retained" } ELSE { if ($KillOrRecycle = "Recycle") { Write-output "$file does not have the archive bit set. Deleting (Sent to recycle bin)." [Microsoft.VisualBasic.FileIO.Filesystem]::DeleteFile($file.fullname,'OnlyErrorDialogs','SendToRecycleBin') $output = $_.ErrorDetails } ELSE { Write-output "$file does not have the archive bit set. Deleting." remove-item -recurse $file.fullname $output =$_.ErrorDetails } } } #end Foreach # Export BackupCounts to XML $bkup_counts | Export-Clixml bkup_counts.xml # Get Number of ZIP files in folder $btype = $null foreach ($btype in $bkupTypeArr) { $FileCountArray += ,@(($btype),(dir $zipFolder\\$btype"*.zip").count) } # Import BkupCounts from XML $bkup_Counts= Import-Clixml bkup_counts.xml # set Attribute byte on ALL files in zipfolder so we know we'll get the right ones attrib $zipFolder"\\*" +a $row = $null # Get LST & DEF filenames in array & display count foreach ($row in $bkup_Counts.Keys) { Get-ChildItem -Path $zipFolder -Include $row"*" -Recurse #| (dir $zipFolder\\$row"*".zip).count - $bkup_Counts[$row] $delfiles = 0 $delfiles = (dir $zipFolder\\$row"*".zip).count - $bkup_Counts[$row] if ($delfiles -gt 0) { #sort folder by createdtime # if more than specified nbr of backups present, un-archive excess ones to delete next run. dir $zipFolder\\$row"*" | sort-object -property {$_.CreationTime} | select-object -first $delfiles | foreach-object { attrib $_.FULLNAME -A} } # end if delfiles gt 0 } # End foreach in bkup_counts } # End Else Last ExitCode = 0
combined_dataset/train/non-malicious/3781.ps1
3781.ps1
function Test-SyncGroup { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $syncGroupName = Get-ResourceName("sg") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices"); Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation; Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup" New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Get SyncGroup by Name" $syncGroup = Get-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName -Verbose Write-Verbose "Validating SyncGroup Properties" Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName Write-Verbose "Get SyncGroup by ParentObject" $syncGroup = Get-AzStorageSyncGroup -ParentObject $storageSyncService -Name $syncGroupName -Verbose Write-Verbose "Validating SyncGroup Properties" Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName Write-Verbose "Get SyncGroup by ParentResourceId" $syncGroup = Get-AzStorageSyncGroup -ParentResourceId $storageSyncService.ResourceId -Name $syncGroupName -Verbose Write-Verbose "Validating SyncGroup Properties" Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName Write-Verbose "Removing SyncGroup: $syncGroupName" Remove-AzStorageSyncGroup -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName -AsJob | Wait-Job New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName | Get-AzStorageSyncGroup | Remove-AzStorageSyncGroup -Force -AsJob | Wait-Job New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName | Remove-AzStorageSyncGroup -Force -AsJob | Wait-Job Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-NewSyncGroup { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $syncGroupName = Get-ResourceName("sg") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices"); Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation; Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup" $syncGroup = New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Validating SyncGroup Properties" Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName Write-Verbose "Removing SyncGroup: $syncGroupName" Remove-AzStorageSyncGroup -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-GetSyncGroup { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $syncGroupName = Get-ResourceName("sg") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices"); Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation; Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup" New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Get SyncGroup by Name" $syncGroup = Get-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName -Verbose Write-Verbose "Validating SyncGroup Properties" Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName Write-Verbose "Removing SyncGroup: $syncGroupName" Remove-AzStorageSyncGroup -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-GetSyncGroups { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $syncGroupName = Get-ResourceName("sg") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices"); Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation; Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup" New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Get SyncGroup by Name" $syncGroups = Get-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Verbose Assert-AreEqual $syncGroups.Length 1 $syncGroup = $syncGroups[0] Write-Verbose "Validating SyncGroup Properties" Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName Write-Verbose "Removing SyncGroup: $syncGroupName" Remove-AzStorageSyncGroup -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-GetSyncGroupParentObject { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $syncGroupName = Get-ResourceName("sg") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices"); Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation; Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup" New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Get SyncGroup by ParentObject" $syncGroup = Get-AzStorageSyncGroup -ParentObject $storageSyncService -Name $syncGroupName -Verbose Write-Verbose "Validating SyncGroup Properties" Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName Write-Verbose "Removing SyncGroup: $syncGroupName" Remove-AzStorageSyncGroup -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-GetSyncGroupParentResourceId { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $syncGroupName = Get-ResourceName("sg") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices"); Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation; Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup" New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Get SyncGroup by ParentResourceId" $syncGroup = Get-AzStorageSyncGroup -ParentResourceId $storageSyncService.ResourceId -Name $syncGroupName -Verbose Write-Verbose "Validating SyncGroup Properties" Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName Write-Verbose "Removing SyncGroup: $syncGroupName" Remove-AzStorageSyncGroup -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-RemoveSyncGroup { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $syncGroupName = Get-ResourceName("sg") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices"); Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation; Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup" New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Removing SyncGroup: $syncGroupName" Remove-AzStorageSyncGroup -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-RemoveSyncGroupInputObject { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $syncGroupName = Get-ResourceName("sg") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices"); Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation; Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup" $syncGroup = New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Removing SyncGroup: $syncGroupName" Remove-AzStorageSyncGroup -InputObject $syncGroup -Force Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-RemoveSyncGroupResourceId { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $syncGroupName = Get-ResourceName("sg") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices"); Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation; Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup" $syncGroup = New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName Write-Verbose "Removing SyncGroup: $syncGroupName" Remove-AzStorageSyncGroup -ResourceId $syncGroup.ResourceId -Force Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } }
combined_dataset/train/non-malicious/sample_11_58.ps1
sample_11_58.ps1
@{ GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854' Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="Copyright (C) Microsoft Corporation. All rights reserved." ModuleVersion = '1.0' NestedModules = @( 'MSFT_MpComputerStatus.cdxml', 'MSFT_MpPreference.cdxml', 'MSFT_MpThreat.cdxml', 'MSFT_MpThreatCatalog.cdxml', 'MSFT_MpThreatDetection.cdxml', 'MSFT_MpScan.cdxml', 'MSFT_MpSignature.cdxml', 'MSFT_MpWDOScan.cdxml', 'MSFT_MpRollback.cdxml' ) FunctionsToExport = @( 'Get-MpPreference', 'Set-MpPreference', 'Add-MpPreference', 'Remove-MpPreference', 'Get-MpComputerStatus', 'Get-MpThreat', 'Get-MpThreatCatalog', 'Get-MpThreatDetection', 'Start-MpScan', 'Update-MpSignature', 'Remove-MpThreat', 'Start-MpWDOScan', 'Start-MpRollback' ) HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762" PowerShellVersion = '3.0' } # SIG # Begin signature block # MIImEQYJKoZIhvcNAQcCoIImAjCCJf4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7 # MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC2IwggTvMIID16ADAgECAhMzAAAK69Nl # RIMWPjjtAAAAAArrMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwMloXDTI0MTAxNjE5MTgwMlowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfg+TEc3bT # Vvq+rfw2TA/Aluhr9MvjyW4v2sVY1+wdq98kJogwk5wRwMEPNKacaRJn02l8VCT5 # eblNMpXt3iD7AcYN+cSnvC4rBDCNKAJAf1ND9AYU9kpP3eKKrxjkbNq5I5uxrIRW # AP2K3gqGsN8peSb+7/BCINSMrmJ7Tx46PXz8asIJY3TEmq4x13zC5uXtIIb1s/d1 # PWrE9KDPyz16VZQx+ZlNEnFVXH6Cg2gw7AJMQLUHJgeLfLcBilLd/P+2j04e7dgD # s6fc0Wrw+Bz5EA/kV77PxHLEt7apceKqp5+dNMo1unzlZuMIh5+A6HA7aXbdF9KX # ujJ6b2MlurVnAgMBAAGjggF3MIIBczAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUU6kklw2HQNa4/ec1p2tW744uJekwVAYDVR0RBE0w # S6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt # aXRlZDEWMBQGA1UEBRMNMjMwMDI4KzUwMTcwNTAfBgNVHSMEGDAWgBTRT6mKBwjO # 9CQYmOUA//PWeR03vDBTBgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5j # cmwwVwYIKwYBBQUHAQEESzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpL2NlcnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBks51pE8oGEEiS12JhhlAAD/Hf # E6sdGt6b37sp62b9mymV/X3pl4YjPxzeckToiB4SBLLCuG6PCFWBWvKF3QZV7p4L # fClCVjXz5SRXHzgZlXnEReG7r4GMXZ9i06zcSWcy/rFEINTZtPCwLYMNTEIpcW+t # ojVpI6X4FRV5YjfFirE4qmmLYyTQioPYJO5/n2/Xz/BcNj2GFvGycjAtuITmvlPH # g/ZTaTas8PD5loz8YKngKl/DvfTWEHDyYAdmNZcNRP2BuKf3kksHN20z6Lf/JCK1 # et2f5zMarFELgr12wrdI/8z4+hleNPf9cqU36jrEFauG+XaucS5UlnGp043TMIIG # azCCBFOgAwIBAgIKYQxqGQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIz # WhcNMjUwNzA2MjA1MDIzWjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSMwIQYDVQQDExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIw # DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+ # DZ0U5LGfwciUsDh8H9AzVfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdS # cFosHZSrGb+vlX2vZqFvm2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/ # OEbmisdzaXZVaZZM5NjwNOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMU # pUwIoIPXIx/zX99vLM/aFtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jA # vguTHijgc23SVOkoTL9rXZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEA # AaOCAeMwggHfMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQY # mOUA//PWeR03vDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0g # BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUH # AgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBl # AG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnC # lHDDZJTD2FamkI7+5Jr0bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz # /Q2QJCTj+dyWyvy4rL/0wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0b # jPMAYkG6SHSHgv1QyfSHKcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9 # TUj3bkFHUhy7G8JXOqiZVpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b # 3CLVFCNqQX/QQqbb7yV7BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9 # pE/oGw5rduS4j7DC6v119yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6Mj # ugagwI7RiE+TIPJwX9hrcqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpol # Vf1Ayq1kEOgx+RJUeRryDtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ # 239Q+J9iguymghZ8ZrzsmbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcN # Gw186/RayZXPhxIKXezFApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w # 3gI/h+5WoezrtUyFMYIaBTCCGgECAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENB # IDIwMTACEzMAAArr02VEgxY+OO0AAAAACuswDQYJYIZIAWUDBAIBBQCgga4wGQYJ # KoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQB # gjcCARUwLwYJKoZIhvcNAQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiq # aVqK3TgLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEa # gBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAU4Gy # QUJHYgLeYLhFgcizDqLgy875NA7NM8TgKTEN3EqUP0Oaig3VgB7rehVU6phrTxKs # 9n7m7/kaqXrou5NVW2G+THlhEWu0UaaSlojLzmxhMIakZHOHLyTn6bz0S0o4yMZ6 # 8QqQqWTU7MiNkIfyGq9IcvnoeZyjBREloQ4veCCvIr2CnRENe3cDVV7/gSu1vXLf # L5AsCTp7aA+lg5rKF2Kjr+wvZ5YxnXqkLjVYYmX9dNTqKVQp2xnLtbiFUVDfe+c4 # XmVEU4dPtLcZdoO6m3vUZ2bCSjnV7XeqJLeOVYKAgdlpVX5rl2pL7Azs7pB2QZ0V # pyexP/sw9u51ejlEtaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3 # DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0BCRAB # BKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCC8 # TMz+fOAm0rvaefncWG5A7JgSm3cFrFVon8BJgRDJdwIGZZ/PqiPeGBMyMDI0MDEx # MjAwNTYwNC45NTRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVy # YXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcx # JTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIHIDCC # BQigAwIBAgITMwAAAdYnaf9yLVbIrgABAAAB1jANBgkqhkiG9w0BAQsFADB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEyMzRaFw0yNDAy # MDExOTEyMzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQL # Ex5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jv # c29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw # ggIKAoICAQDPLM2Om8r5u3fcbDEOXydJtbkW5U34KFaftC+8QyNqplMIzSTC1ToE # 0zcweQCvPIfpYtyPB3jt6fPRprvhwCksUw9p0OfmZzWPDvkt40BUStu813QlrloR # dplLz2xpk29jIOZ4+rBbKaZkBPZ4R4LXQhkkHne0Y/Yh85ZqMMRaMWkBM6nUwV5a # DiwXqdE9Jyl0i1aWYbCqzwBRdN7CTlAJxrJ47ov3uf/lFg9hnVQcqQYgRrRFpDNF # MOP0gwz5Nj6a24GZncFEGRmKwImL+5KWPnVgvadJSRp6ZqrYV3FmbBmZtsF0hSlV # jLQO8nxelGV7TvqIISIsv2bQMgUBVEz8wHFyU3863gHj8BCbEpJzm75fLJsL3P66 # lJUNRN7CRsfNEbHdX/d6jopVOFwF7ommTQjpU37A/7YR0wJDTt6ZsXU+j/wYlo9b # 22t1qUthqjRs32oGf2TRTCoQWLhJe3cAIYRlla/gEKlbuDDsG3926y4EMHFxTjsj # rcZEbDWwjB3wrp11Dyg1QKcDyLUs2anBolvQwJTN0mMOuXO8tBz20ng/+Xw+4w+W # 9PMkvW1faYi435VjKRZsHfxIPjIzZ0wf4FibmVPJHZ+aTxGsVJPxydChvvGCf4fe # 8XfYY9P5lbn9ScKc4adTd44GCrBlJ/JOsoA4OvNHY6W+XcKVcIIGWwIDAQABo4IB # STCCAUUwHQYDVR0OBBYEFGGaVDY7TQBiMCKg2+j/zRTcYsZOMB8GA1UdIwQYMBaA # FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3Rh # bXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUH # MAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9z # b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQC # MAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG # SIb3DQEBCwUAA4ICAQDUv+RjNidwJxSbMk1IvS8LfxNM8VaVhpxR1SkW+FRY6AKk # n2s3On29nGEVlatblIv1qVTKkrUxLYMZ0z+RA6mmfXue2Y7/YBbzM5kUeUgU2y1M # mbin6xadT9DzECeE7E4+3k2DmZxuV+GLFYQsqkDbe8oy7+3BSiU29qyZAYT9vRDA # LPUC5ZwyoPkNfKbqjl3VgFTqIubEQr56M0YdMWlqCqq0yVln9mPbhHHzXHOjaQsu # rohHCf7VT8ct79po34Fd8XcsqmyhdKBy1jdyknrik+F3vEl/90qaon5N8KTZoGtO # FlaJFPnZ2DqQtb2WWkfuAoGWrGSA43Myl7+PYbUsri/NrMvAd9Z+J9FlqsMwXQFx # AB7ujJi4hP8BH8j6qkmy4uulU5SSQa6XkElcaKQYSpJcSjkjyTDIOpf6LZBTaFx6 # eeoqDZ0lURhiRqO+1yo8uXO89e6kgBeC8t1WN5ITqXnjocYgDvyFpptsUDgnRUiI # 1M/Ql/O299VktMkIL72i6Qd4BBsrj3Z+iLEnKP9epUwosP1m3N2v9yhXQ1HiusJl # 63IfXIyfBJaWvQDgU3Jk4eIZSr/2KIj4ptXt496CRiHTi011kcwDpdjQLAQiCvoj # 1puyhfwVf2G5ZwBptIXivNRba34KkD5oqmEoF1yRFQ84iDsf/giyn/XIT7YY/zCC # B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAw # gYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT # KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIx # MDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57Ry # IQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VT # cVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhx # XFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ # HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1 # KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s # 4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUg # fX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3 # Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je # 1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUY # hEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUY # P3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGC # NxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4w # HQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYB # BAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcD # CDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0T # AQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNV # HR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9w # cm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEE # TjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOC # AgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/a # ZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp # 4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq # 95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB # woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG # +jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3B # FARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77 # IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJ # fn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K # 6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDx # yKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIBATCB # +aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEl # MCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD5r3DVRpAGQo9s # TLUHeBC87NpK+qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MA0GCSqGSIb3DQEBCwUAAgUA6Ur23zAiGA8yMDI0MDExMTIzMjMxMVoYDzIwMjQw # MTEyMjMyMzExWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpSvbfAgEAMAcCAQAC # AgQYMAcCAQACAhU+MAoCBQDpTEhfAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG # AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQAD # ggEBACno8CogT+Xwzfb7b33B7KBa0OpBUCO+m+nSFzOecC+7WUCbQ47e44m0MUGI # DHnxmCAPWF4X/za+XHtnQ/z8c+dhM0UKHfxic+KxZR0OTS0FKa8fAdty/Zv656Uk # iZ8Qb2SjU+ZUj3y7DLSQ6psy6Gh5NV0kwhPosZDWNMseKHO7FH8kRY6uGua+r00L # 9hCQcUf8ekLZ/b/Zwodz9D6xo3QCgQs4nB7NJepSIVxNjJvMWC+FCxplBKbySUkK # CEs50x6iJnlUCsMm6zPz5x/DCn0o8qyKEVK6CYHJqrhMmF0wizBIDl0nTFAYWuOo # GqLLL+mNNf/144gMgkisEl+TJL8xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdYnaf9yLVbIrgABAAAB1jANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCAKly3Qp7jIV88ouK0mLrkzS9HdIS8EY0/Oy2CCHLjxIjCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EINbLTQ1XeNM+EBinOEJMjZd0jMNDur+AK+O8P12j # 5ST8MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHW # J2n/ci1WyK4AAQAAAdYwIgQgqgKVOn4d3fahYzULOQfdc47J0jL631hgDfRk3zmA # SCcwDQYJKoZIhvcNAQELBQAEggIAR6n89A+ZHy8DfzY4Z295YzoMMiB970C9QpHt # +O53neMguDJ/TJjT8B63Dy7GEpCYy1QCtIqKHJtQoDZqHGPekteW//S3FIEV1dmr # VX5MO9iJ3R8m7/Z0LtkMybdXqZ8VI+9VGNip4ecMJP/0msqP39ZqjuwjyRFRQAkh # xa2fMyj6LguzwLTQjb17bk6jNBKUXBovzmRYb/glKWFI98nUfn0AAd4IZNtdubfu # qnpeVMkpKFIQB4F+UKQeqHkg2ebhX7e+ZqSPkwvsFepw32Z+4iwDZW5Ir+Dqd4oW # dA3OobpRN2mqIWFuPjizg4AlbxHDm/buNomjlWubvOAnHehkt5lUrNs15L47f09+ # 1/gqF8M6QSzOr/e8Lg/dDXlMVuJS0I+iThTW7CKnDi1iqmiMz0NQ4s2LFwqNRJkD # JuC6q8uFprwOexqoxpoWHAq57Y7q0+YRsTp/D/Gw6UCdU9ILgeNE1hpDJTKLVSlu # +8OofizokYI4rceXLGgygP+ukAMJKuzwbfOGdDBDWwTy6le77GzwmS6OrGVKF/Da # /3gUX/A9TuoGx5/PwUXUHcWjN+FmtY1As/QtOx6/bmICML1eRYXKLIcC8ruk8G1e # GIv+WL3EN0XiascuYoxfU6XCssE/gNOUvRk/kKsrrY/xjxJxKcdq4xbouw/SE+T/ # njMXi40= # SIG # End signature block
combined_dataset/train/non-malicious/1139.ps1
1139.ps1
Set-StrictMode -Version 'Latest' & (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve) Describe 'Get-ServiceConfiguration' { BeforeEach { $Global:Error.Clear() } It 'should load all service configuration' { Get-Service | Where-Object { $_.Name -notlike 'Carbon*' } | Get-ServiceConfiguration | Format-List -Property * $Global:Error.Count | Should -Be 0 } It 'should write an error if the service doesn''t exist' { $info = Get-CServiceConfiguration -Name 'YOLOyolo' -ErrorAction SilentlyContinue $info | Should -BeNullOrEmpty $Global:Error | Should -Match 'Cannot\ find\ any\ service' } It 'should ignore missing service' { $info = Get-CServiceConfiguration -Name 'FUBARsnafu' -ErrorAction Ignore $info | Should -BeNullOrEmpty $Global:Error | Should -BeNullOrEmpty } It 'should load extended type data' { $services = Get-Service | Where-Object { $_.Name -notlike 'Carbon*' } $memberNames = $null foreach( $service in $services ) { $info = Get-CServiceConfiguration -Name $service.Name if( -not $memberNames ) { $memberNames = $info | Get-Member -MemberType 'Property' | Select-Object -ExpandProperty 'Name' } foreach( $memberName in $memberNames ) { $info.$memberName | Should -Be $service.$memberName } } $Global:Error.Count | Should -Be 0 } }
combined_dataset/train/non-malicious/2262.ps1
2262.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true)] $DriveLetter, [parameter(Mandatory=$true)] $ShareName, [parameter(Mandatory=$true)] $ADGroup, [parameter(Mandatory=$false)] [switch]$CreateDFS ) $ErrorActionPreference = "Stop" try { [System.Reflection.Assembly]::LoadWithPartialName("System.DirectoryServices") | Out-Null } catch { Write-Error $_.Exception } try { $Domain = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain() | Select-Object -ExpandProperty Name } catch { Write-Error $_.Exception } if ($CreateDFS -eq $true) { $DFSRoles = @("FS-DFS-Namespace", "RSAT-DFS-Mgmt-Con") $DFSRoles | ForEach-Object { Install-WindowsFeature $_ | Out-Null } } $FolderStructure = @( "$($DriveLetter)\$($ShareName)", "$($DriveLetter)\$($ShareName)\Apps", "$($DriveLetter)\$($ShareName)\Pkgs", "$($DriveLetter)\$($ShareName)\SUM", "$($DriveLetter)\$($ShareName)\SUM\ADRs", "$($DriveLetter)\$($ShareName)\OSD", "$($DriveLetter)\$($ShareName)\OSD\BootImages", "$($DriveLetter)\$($ShareName)\OSD\CSettings", "$($DriveLetter)\$($ShareName)\OSD\DriverSources", "$($DriveLetter)\$($ShareName)\OSD\DriverPackages", "$($DriveLetter)\$($ShareName)\OSD\OSImages", "$($DriveLetter)\$($ShareName)\OSD\MDT", "$($DriveLetter)\$($ShareName)\OSD\MDT\Settings", "$($DriveLetter)\$($ShareName)\OSD\MDT\Toolkit" ) $FolderStructure | ForEach-Object { try { if (-not(Test-Path -Path $_ -ErrorAction SilentlyContinue)) { Write-Output "INFO: Creating folder $($_)" New-Item -Path $_ -ItemType Directory | Out-Null } } catch { Write-Error $_.Exception } } try { $ACLObject = Get-Acl "$($DriveLetter)\$($ShareName)" $ACLObject.SetAccessRuleProtection($True, $False) $RuleObject = New-Object System.Security.AccessControl.FileSystemAccessRule("$($ADGroup)","FullControl","ContainerInherit,ObjectInherit","None","Allow") $ACLObject.AddAccessRule($RuleObject) $RuleObject = New-Object System.Security.AccessControl.FileSystemAccessRule("SYSTEM","FullControl","ContainerInherit,ObjectInherit","None","Allow") $ACLObject.AddAccessRule($RuleObject) $RuleObject = New-Object System.Security.AccessControl.FileSystemAccessRule("Administrators","FullControl","ContainerInherit,ObjectInherit","None","Allow") $ACLObject.AddAccessRule($RuleObject) $RuleObject = New-Object System.Security.AccessControl.FileSystemAccessRule("Authenticated Users",@("ReadData","AppendData","Synchronize"),"None","None","Allow") $ACLObject.AddAccessRule($RuleObject) $RuleObject = New-Object System.Security.AccessControl.FileSystemAccessRule("CREATOR OWNER","FullControl","ContainerInherit,ObjectInherit","InheritOnly","Allow") Set-Acl "$($DriveLetter)\$($ShareName)" $ACLObject } catch { Write-Warning $_.Exception } try { if ($ShareName.Substring(($ShareName.Length-1)) -match "$") { $Data = $ShareName.Substring(0,($ShareName.Length-1)) } $SecurityDescriptor = ([WmiClass]"\\$($env:COMPUTERNAME)\root\cimv2:Win32_SecurityDescriptor").CreateInstance() $ACE = ([WmiClass]"\\$($env:COMPUTERNAME)\root\cimv2:Win32_ACE").CreateInstance() $Trustee = ([WmiClass]"\\$($env:COMPUTERNAME)\root\cimv2:Win32_Trustee").CreateInstance() $Trustee.Name = "Everyone" $Trustee.Domain = $null $ACE.AccessMask = 2032127 $ACE.AceFlags = 3 $ACE.AceType = 0 $ACE.Trustee = $Trustee $SecurityDescriptor.DACL += $ACE.PsObject.BaseObject $WMIConnection = [WmiClass]"\\$($env:COMPUTERNAME)\root\cimv2:Win32_Share" $ObjectParams = $WMIConnection.psbase.GetMethodParameters("Create") $ObjectParams.Path = "$($DriveLetter)\$($Data)$" $ObjectParams.Name = "$($Data)$" $ObjectParams.Type = 0 $ObjectParams.MaximumAllowed = 100 $ObjectParams.Access = $SecurityDescriptor $WMIConnection.InvokeMethod("Create",$ObjectParams,$null) | Out-Null $GetShareObject = Get-WmiObject -Namespace "root\cimv2" -Class "Win32_Share" | Where-Object { $_.Name -like "$($Data)$" } if ($GetShareObject) { Write-Output "INFO: Successfully shared \\$($env:COMPUTERNAME)\$($Data)$" } } catch { Write-Warning $_.Exception } if ($PSBoundParameters["CreateDFS"].IsPresent) { try { New-DfsnRoot -Path "\\$($Domain)\$($Data)$" -TargetPath "\\$($env:COMPUTERNAME)\$($Data)$" -Type DomainV2 -State Online | Out-Null } catch { Write-Warning $_.Exception } }
combined_dataset/train/non-malicious/2430.ps1
2430.ps1
[CmdletBinding()] param ( [Parameter(Mandatory,ValueFromPipeline,ValueFromPipelineByPropertyName)] [string[]]$ServiceName, [Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName)] [ValidateScript({Test-Connection -ComputerName $_ -Quiet -Count 1 })] [string[]]$Computername = 'localhost', [Parameter(Mandatory)] [string]$Username, [Parameter(Mandatory)] [string]$Password ) process { foreach ($Computer in $Computername) { foreach ($Service in $ServiceName) { try { Write-Verbose -Message "Changing service '$Service' on the computer '$Computer'" $s = Get-WmiObject -ComputerName $Computer -Class Win32_Service -Filter "Name = '$Service'" if (!$s) { throw "The service '$Service' does not exist" } $s.Change($null, $null, $null, $null, $null, $null, $Username, $Password) | Out-Null $s | Restart-Service -Force } catch { Write-Error -Message "Error: Computer: $Computer - Service: $Service - Error: $($_.Exception.Message)" } } } }
combined_dataset/train/non-malicious/sample_65_10.ps1
sample_65_10.ps1
# # Module manifest for module 'PSGet_AzStackHci.EnvironmentChecker' # # Generated by: Microsoft Corporation # # Generated on: 19/01/2022 # @{ # Script module or binary module file associated with this manifest. RootModule = '' # Version number of this module. ModuleVersion = '1.2100.2671.410' # Supported PSEditions # CompatiblePSEditions = '' # ID used to uniquely identify this module GUID = '9ee2434c-26a4-4fad-909d-2dc59f4b657b' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) 2022 Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft AzStackHci Readiness Checker' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @( 'AzStackHci.Connectivity.psm1' 'AzStackHci.Connectivity.Helpers.psm1' ) # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @('Invoke-AzStackHciConnectivityValidation', 'Get-AzStackHciConnectivityServiceName', 'Get-AzStackHciConnectivityOperationName' ) # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Microsoft','AzStackHci' # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCbBRp4czO32Gty # FHPuzNaErRLNIxPMgnBKulxkj5uv16CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILeBbQrf/XKyAd0AX7HYr1x9 # EER6RRFxhRVzXUZ5DwagMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAi1/69E8l5Vo15vGGuWjSLIcvHf0k8vSSOhvD0so+xJtHgNmy2+UpaA9s # eaDW3gLw2pYpwMC0IesAxMxSpIQVutirYviI8udPeW6gyTt9H2xUjsYyeKjGmcg9 # VZ7B5mDyXl85Mic6ZpJG97/U+7bxx26Le2vR+Vj1E6k7sFoyHjpuYmAWQHWgZbiD # CfX8hhXX3I8uS5mN+uYYfq7IdW3zF77ztR5Q/1LwYbeXeDFcZBnO064r1cMHQb7G # iI1MJ55PAMnM3o4bpdZMsyrg0dbbDAUrxD1gAEgPZ8wBjM5CLOunIxd6uHSk4LTX # C1Z6x/7DMtgROx/mVznGmwlT9dxp2qGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBa9GQRTe+Xo/csSRvY258jEj6JV3cmHoXY1wWtLeoFWAIGZjOrHlUn # GBMyMDI0MDUxNjE4NDQyOS4yODFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC # QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh # h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa # 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD # HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF # Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/ # 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd # 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ # 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM # OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV # RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl # jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC # EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S # usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M # qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w # KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf # RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc # m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa # 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw # 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0 # SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S # FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC # qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy # o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5 # XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox # NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnwnUMwIhgPMjAyNDA1MTYyMjU3MDdaGA8yMDI0MDUxNzIyNTcwN1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6fCdQwIBADAHAgEAAgID3zAHAgEAAgIRrTAKAgUA # 6fHuwwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGRlJmD4Pm0a2ZXNrC7c # hWy5hXLsafZMqicwyWFUOagBv008UJXV934PwR/AYu6JEfRQNBQKDOYskFLAOnvO # jXU9VhvPALsmy8+mZD2thf4r2HFkYffZGvyfS7G61QPbGd/6gez0O4p8pdFeQq8o # jY4M2biKfSLGPGc+lo2XncRfMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgkjjui/hGQLpBYjNRLhGHrY3W6OVfB/iihYMtOupDWzwwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK # wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8 # HxMVH35dAAEAAAHgMCIEIKTJslI+Gq3aHsWJ9P5eKg7d9P5UfEDHlHAwLXSd1TWf # MA0GCSqGSIb3DQEBCwUABIICADVBgmhvKvsdtmQnUquLfm9qOf4Q/NWGx7uf0bfA # mc/cpNVAPGTcNvdYPG1egUeq7uUPoK0gcN1nUjF4zvJbofaRGiBUwIk0gcXeHz4e # OZRJDroXLj3fR7KG9GH+LsvtK3Cmk0wx+nLc4OhmdBOg9IMVU8BDDn5wPDifJ/TV # Sifs/Z1U6NEx05ONpBUm+9cusL423TgtprajTSiLs7JIx13LaM/WDSgW1GwgBHh4 # Q5nE3fHtbRzvbnDB6DlqxUdusARrZkGOiUZIvWqDaxZkG4YynuzIDM2zTMm7ArVf # CHqROpYrOW/sHnj81vJsN060Q7PByBwbShVcPjBR4iBPopHUmit/+PudKAmr62wJ # 9eFGR50izrk1xrejZGonXQivT6qWipsYrvnuPjZHj1XAq2TvnteF1lV2FUmRL7ee # BIEhcidhtfZ8LC4w4LX1PGIr/gBOWNJM8dHpMf8X+LY0UnnY7W1mJYKZxtL7HlnJ # hs8/gbYet/S+VhJRwIZsOHN6C5lOOWIoo5jYOLNTyxhC+O3WxFW/1+3XAwgTSUTx # QW50Rked/XEDVgiagAC/w8bQDgZijSOl0j3bWkatxp5BaLqSToxIyE4ILQk0evh6 # OzN4UDdILbhnhfyrswX4uZVkWTENHR6nLzjzurW8YKdJW5TlbXuAu3skSbFuYar2 # wj8C # SIG # End signature block
combined_dataset/train/non-malicious/View-Process.ps1
View-Process.ps1
function View-Process { param( [string[]]$ComputerNames, [string[]]$ProcessNames, $User ) ########################################################################################################### if ($User -is [String]) { $Connection = Get-Credential -Credential $User } ########################################################################################################### foreach ($int1 in $ComputerNames) { if ($ProcessNames -eq $null) { if ($Connection -eq $null) { $View_Process = gwmi "win32_process" -ComputerName $int1 | select __SERVER,Name,Handle } else { $View_Process = gwmi "win32_process" -ComputerName $int1 -Credential $Connection | select __SERVER,Name,Handle } $View_Process } else { foreach ($int2 in $ProcessNames) { if ($int2 -notlike "*.exe") {$int2 = $int2 + '.exe'} if ($Connection -eq $null) { $View_Process = gwmi "win32_process" -ComputerName $int1 -filter "name='$int2'" | select __SERVER,Name,Handle } else { $View_Process = gwmi "win32_process" -ComputerName $int1 -filter "name='$int2'" -Credential $Connection | select __SERVER,Name,Handle } $View_Process } } } ########################################################################################################### }
combined_dataset/train/non-malicious/sample_52_4.ps1
sample_52_4.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. function ConvertFrom-ScriptExtent { <# .EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml #> [CmdletBinding()] [OutputType([Microsoft.PowerShell.EditorServices.Extensions.IFileRange, Microsoft.PowerShell.EditorServices], ParameterSetName='BufferRange')] [OutputType([Microsoft.PowerShell.EditorServices.Extensions.IFilePosition, Microsoft.PowerShell.EditorServices], ParameterSetName='BufferPosition')] param( [Parameter(Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName)] [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent[]] $Extent, [Parameter(ParameterSetName='BufferRange')] [switch] $BufferRange, [Parameter(ParameterSetName='BufferPosition')] [switch] $BufferPosition, [Parameter(ParameterSetName='BufferPosition')] [switch] $Start, [Parameter(ParameterSetName='BufferPosition')] [switch] $End ) process { foreach ($aExtent in $Extent) { switch ($PSCmdlet.ParameterSetName) { BufferRange { # yield [Microsoft.PowerShell.EditorServices.Extensions.FileRange, Microsoft.PowerShell.EditorServices]::new( $aExtent.StartLineNumber, $aExtent.StartColumnNumber, $aExtent.EndLineNumber, $aExtent.EndColumnNumber) } BufferPosition { if ($End) { $line = $aExtent.EndLineNumber $column = $aExtent.EndLineNumber } else { $line = $aExtent.StartLineNumber $column = $aExtent.StartLineNumber } # yield [Microsoft.PowerShell.EditorServices.Extensions.FileRange, Microsoft.PowerShell.EditorServices]::new( $line, $column) } } } } } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBPKxil1U4JnRPS # QyqUqw0RKxJ6fsZihk0k1ECh3hKbp6CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIK4/ # 5I8fIFzVsF+1m770kKJ3FjDZS+ZNvbZeAbFH/Nn6MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAPjEqhEi/tA3h2TqnT1tkgZNUOD2yLnDmyKW5 # B6XgbNdHfxF4fzL79K3Fu3oCuNa2zT2C8uNf8jRkpZRDXKb1oHon8KcUs/Nx9nHD # 4ynu+NmvwJLXonvpFBMuhB4s2OSWvLwXIbj1tLzn+W8yEl2KoPE2ZpuJJDoiily3 # A3TI6Lctb5DgEFyUZ8nVzv3Q+Ff+2/6mhfLWZ8HpTbiOGKdjHIUjJvktmwtTqduO # MMfhzY7cfEt3vW1cBvkqoJzZrMe8AOzN1ISCwb4hvIRzEqu/cO75MojvmWXhETEo # to4E20SHsmqzqdmHCiNBw467ZqPOfcESzRFiW+3r+4lHk8z1HqGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCC0b6WDzAPx4DMWpcvN+xb7J0p0OhzfLVj7 # yhTuGIGW3wIGZXsV8QF4GBMyMDI0MDEwNDAyMDg1My4xMTFaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAdTk6QMvwKxprAAB # AAAB1DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzA1MjUxOTEyMjdaFw0yNDAyMDExOTEyMjdaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCYU94tmwIkl353SWej1ybW # cSAbu8FLwTEtOvw3uXMpa1DnDXDwbtkLc+oT8BNti8t+38TwktfgoAM9N/BOHyT4 # CpXB1Hwn1YYovuYujoQV9kmyU6D6QttTIKN7fZTjoNtIhI5CBkwS+MkwCwdaNyyS # vjwPvZuxH8RNcOOB8ABDhJH+vw/jev+G20HE0Gwad323x4uA4tLkE0e9yaD7x/s1 # F3lt7Ni47pJMGMLqZQCK7UCUeWauWF9wZINQ459tSPIe/xK6ttLyYHzd3DeRRLxQ # P/7c7oPJPDFgpbGB2HRJaE0puRRDoiDP7JJxYr+TBExhI2ulZWbgL4CfWawwb1Ls # JmFWJHbqGr6o0irW7IqDkf2qEbMRT1WUM15F5oBc5Lg18lb3sUW7kRPvKwmfaRBk # rmil0H/tv3HYyE6A490ZFEcPk6dzYAKfCe3vKpRVE4dPoDKVnCLUTLkq1f/pnuD/ # ZGHJ2cbuIer9umQYu/Fz1DBreC8CRs3zJm48HIS3rbeLUYu/C93jVIJOlrKAv/qm # YRymjDmpfzZvfvGBGUbOpx+4ofwqBTLuhAfO7FZz338NtsjDzq3siR0cP74p9UuN # X1Tpz4KZLM8GlzZLje3aHfD3mulrPIMipnVqBkkY12a2slsbIlje3uq8BSrj725/ # wHCt4HyXW4WgTGPizyExTQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDzajMdwtAZ6 # EoB5Hedcsru0DHZJMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQC0xUPP+ytwktdR # hYlZ9Bk4/bLzLOzq+wcC7VAaRQHGRS+IPyU/8OLiVoXcoyKKKiRQ7K9c90OdM+qL # 4PizKnStLDBsWT+ds1hayNkTwnhVcZeA1EGKlNZvdlTsCUxJ5C7yoZQmA+2lpk04 # PGjcFhH1gGRphz+tcDNK/CtKJ+PrEuNj7sgmBop/JFQcYymiP/vr+dudrKQeStcT # V9W13cm2FD5F/XWO37Ti+G4Tg1BkU25RA+t8RCWy/IHug3rrYzqUcdVRq7UgRl40 # YIkTNnuco6ny7vEBmWFjcr7Skvo/QWueO8NAvP2ZKf3QMfidmH1xvxx9h9wVU6rv # EQ/PUJi3popYsrQKuogphdPqHZ5j9OoQ+EjACUfgJlHnn8GVbPW3xGplCkXbyEHh # eQNd/a3X/2zpSwEROOcy1YaeQquflGilAf0y40AFKqW2Q1yTb19cRXBpRzbZVO+R # XUB4A6UL1E1Xjtzr/b9qz9U4UNV8wy8Yv/07bp3hAFfxB4mn0c+PO+YFv2YsVvYA # TVI2lwL9QDSEt8F0RW6LekxPfvbkmVSRwP6pf5AUfkqooKa6pfqTCndpGT71Hyil # telaMhRUsNVkaKzAJrUoESSj7sTP1ZGiS9JgI+p3AO5fnMht3mLHMg68GszSH4Wy # 3vUDJpjUTYLtaTWkQtz6UqZPN7WXhjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQAtM12Wjo2xxA5sduzB/3HdzZmiSKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6T/xwTAi # GA8yMDI0MDEwMzE0NDYyNVoYDzIwMjQwMTA0MTQ0NjI1WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDpP/HBAgEAMAcCAQACAiFXMAcCAQACAhPIMAoCBQDpQUNBAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBALufOA9K6r3uobCpP1be2P4LwO5g # LCJ/JZ2A/40jbyBVBk3jk8uPQFM/7Ny79WYdEXDvPduGHUgo/Eo9ngrpID5meSe6 # tmrYO0Em2ueEBlslhPabP8wGoyEyMQkPDA3WHQk8CH3Ec93wBPEIKN0Ua7xHpOzW # p+GcZiRKs0oUg3YEmHdRhyU7vxOKoXKhMKD4E++6SG+LdWY89dh5XH7zlOkfELPQ # +iYamyMCfDNBZSzJGkhGNYRHnVpRCJL2B3+p8t9eh7a66mWh2jRCc7UzHKgm6mct # GtnzuvHQTzH+DCzCkt1t1NZeUQ7t8kWWBeJKkJz3XyTcXurQdfmZBG9eOzsxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdTk # 6QMvwKxprAABAAAB1DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCA41yl7g44MbGEp9Ai1uL7gmkSw # eoloQlc4ZWNSX3C5bzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIMzqh/rY # FKXOlzvWS5xCtPi9aU+fBUkxIriXp2WTPWI3MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHU5OkDL8CsaawAAQAAAdQwIgQgoF7qE+Me # TL9N6DGst7RvaXCDpOWS8qcQIsyNaRgAiZswDQYJKoZIhvcNAQELBQAEggIAMPsb # ZdCMpBrLv5WhMZpxXC04dSLB4WH86rzroy1fFz/0NeHlABhuhfqg/IgFFu2s9NDA # ZjJIzZKRsBM3gnG7YJABWUJoRNcdFu6+DDWc6E+AaO+gFmQ7nM3uLO3R20N/GhMG # N3oaw2RMY+nOdczjgBlSKbo860A0d1rsgWuJ9F7CMEGl8LmnXHZfKB3vz12SlB8n # kDFp/KLOCf/1+1+Uoq8twsM3LukSZSTLtljLVsaWGeYbBjY3L1okZxRD40YI3phI # AYKZekdECKxvHgJ6JalY2VFxfUs5BXCtWzU2KpvffEMVwKwOm7bePJqtu72/pGl1 # kDrCsbeNxnRgR+rGNgSrKnk1BSZNyXNsdp/VjteWx7WgjisBgzaVfH3iYif92MH5 # 655KYJGLpc3Cj7I1aZ6uBVgqp86Z/lbtXSCvf5/w9YglzH6Hw6Lm+KsAq3CJ57RZ # 60gF0eJAN3L8c0f/pzgRlVqPvS7xgdEdK6gudZZiW+anvbXAxJ8jdSkcBEogP0Jb # m3NuzCOsGydTnRxdkaGqxbmENM9fC9jfBxvMmHD89gFzbdxAsPrhTn7oi7H2Bqe/ # GxvRkcoyiH8Gkcid19VgtV07F7XHNs4NJL69zWnafLnlbgMK+dX5XRZ1L6dWYkzv # wf/UvaW5Cz6DYLOPpAOGUNkoUGPO5kkNiaLJq3U= # SIG # End signature block
combined_dataset/train/non-malicious/New-XVM_10.ps1
New-XVM_10.ps1
Function New-XVM { [cmdletbinding()] Param ( [Parameter(Mandatory=$false,Position=1)] [string]$ComputerName=$env:COMPUTERNAME, [Parameter(Mandatory=$true,Position=2)] [string]$Name, [Parameter(Mandatory=$true,Position=3)] [string]$SwitchName, [Parameter(Mandatory=$true,Position=4)] [ValidateSet("NoVHD","ExistingVHD","NewVHD","Differencing")] [string]$VhdType, [Parameter(Mandatory=$false,Position=5)] [hashtable]$Configuration ) DynamicParam { Switch ($VhdType) { "ExistingVHD" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "ByParam" $attributes.Mandatory = $true $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $vhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("VhdPath", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("VhdPath",$vhdPath) return $paramDictionary break } "NewVHD" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "ByParam" $attributes.Mandatory = $false $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $diskType = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskType", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("DiskType",$diskType) $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "ByParam" $attributes.Mandatory = $false $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $diskSize = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskSize", [uint64], $attributeCollection) $paramDictionary.Add("DiskSize",$diskSize) return $paramDictionary break } "Differencing" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "ByParam" $attributes.Mandatory = $true $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $parentVhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("ParentVhdPath", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("ParentVhdPath",$parentVhdPath) return $paramDictionary } } } Begin { Try { $vmHost = Get-VMHost -ComputerName $ComputerName -ErrorAction:Stop } Catch { $PSCmdlet.ThrowTerminatingError($Error[0]) } $defaultVirtualHardDiskPath = $vmHost.VirtualHardDiskPath } Process { $validConfigNames = "MemoryStartupBytes","BootDevice" $configParams = @() Switch ($VhdType) { "NoVHD" { $newVhdPath = $null } "ExistingVHD" { $newVhdPath = $vhdPath.Value } "NewVhd" { if (-not $diskType.IsSet) {$diskType.Value = "Dynamic"} if (-not $diskSize.IsSet) {$diskSize.Value = 127GB} $newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx" Switch ($diskType.Value) { "Fixed" { $vhdFile = New-VHD -Fixed -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop } "Dynamic" { $vhdFile = New-VHD -Dynamic -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop } } } "Differencing" { $newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx" $vhdFile = New-VHD -Differencing -ParentPath $parentVhdPath.Value -Path $newVhdPath -ErrorAction Stop } } if ($vhdFile -ne $null) { $command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -VHDPath '$($vhdFile.Path)'" } else { $command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -NoVHD" } if ($Configuration -ne $null) { foreach ($configName in $Configuration.Keys.GetEnumerator()) { if ($validConfigNames -contains $configName) { $configParams += "-$configName" + " " + $Configuration[$configName] } } $configParams = $configParams -join " " } if ($configParams.Count -eq 0) { $command += " -ErrorAction Stop" } else { $command += " $configParams -ErrorAction Stop" } Try { Invoke-Expression -Command $command } Catch { $PSCmdlet.WriteError($Error[0]) Remove-Item -Path $vhdFile.Path } } End {} }
combined_dataset/train/non-malicious/Reflection_1.ps1
Reflection_1.ps1
$nul = "<NULL>" function Get-AssembliesTree { [AppDomain]::CurrentDomain.GetAssemblies() | % { $nod = New-Object Windows.Forms.TreeNode $nod.Text = $_.GetName().Name $nod.Tag = $_ $tvAssem.Nodes.Add($nod) $nod.Nodes.Add($nul) } } function Add-Types { $_.Node.Nodes.Clear() try { foreach ($t in $_.Node.Tag.GetTypes()) { if ($t.IsPublic) { $node = $_.Node.Nodes.Add($t.FullName) $node.Tag = $t $node.Nodes.Add($nul) } } } catch {} } function Add-Members { try { foreach ($m in $_.Node.Tag.GetMembers()) { $node = $_.Node.Nodes.Add($m.Name) $node.Tag = $m.MemberType } } catch {} } $tvAssem_BeforeExpand= { Add-Types Add-Members } function frmMain_Show { Add-Type -AssemblyName System.Windows.Forms [Windows.Forms.Application]::EnableVisualStyles() $ico = [Drawing.Icon]::ExtractAssociatedIcon(( [Runtime.InteropServices.RuntimeEnvironment]::GetRuntimeDirectory() + '\\MSBuild.exe' )) $frmMain = New-Object Windows.Forms.Form $tvAssem = New-Object Windows.Forms.TreeView $sbPanel = New-Object Windows.Forms.StatusBar # #tvAssem # $tvAssem.Dock = "Fill" $tvAssem.Sorted = $true $tvAssem.Add_AfterSelect({$sbPanel.Text = $_.Node.Tag}) $tvAssem.Add_BeforeExpand($tvAssem_BeforeExpand) # #sbPanel # $sbPanel.Font = New-Object Drawing.Font("Microsoft Sans Serif", 9, [Drawing.FontStyle]::Bold) $sbPanel.SizingGrip = $false # #frmMain # $frmMain.ClientSize = New-Object Drawing.Size(590, 550) $frmMain.Controls.AddRange(@($tvAssem, $sbPanel)) $frmMain.FormBorderStyle = "FixedSingle" $frmMain.Icon = $ico $frmMain.StartPosition = "CenterScreen" $frmMain.Text = "Reflection" $frmMain.Add_Load({Get-AssembliesTree}) [void]$frmMain.ShowDialog() } frmMain_Show
combined_dataset/train/non-malicious/Spread-Mailboxes.ps1
Spread-Mailboxes.ps1
########################################################################### # # NAME: Spread-Mailboxes.ps1 # # AUTHOR: Jan Egil Ring # EMAIL: jer@powershell.no # # COMMENT: Script to spread mailboxes alphabetically across mailboxdatabases based on the first character in the user`s displayname. # For more information, see the following blog-post: http://blog.powershell.no/2010/05/14/script-to-spread-exchange-mailboxes-alphabetically-across-databases # # You have a royalty-free right to use, modify, reproduce, and # distribute this script file in any way you find useful, provided that # you agree that the creator, owner above has no warranty, obligations, # or liability for such use. # # VERSION HISTORY: # 1.0 14.05.2010 - Initial release # ########################################################################### #Add the Exchange Server 2010 Management Shell snapin Add-PSSnapin Microsoft.Exchange.Management.PowerShell.E2010 -ErrorAction SilentlyContinue #Loop through each mailbox foreach ($mailbox in (Get-Mailbox -ResultSize unlimited)) { $displayname = $mailbox.Displayname #Determine which database the mailbox should reside on. Displaynames not matching [A-Z] on first character goes to the last database. switch -regex ($displayname.substring(0,1)) { "[A-F]" {$mailboxdatabase = "MDB A-F"} "[G-L]" {$mailboxdatabase = "MDB G-L"} "[M-R]" {$mailboxdatabase = "MDB M-R"} "[S-X]" {$mailboxdatabase = "MDB S-X" } "[Y-Z]" {$mailboxdatabase = "MDB Y-Z" } default {$mailboxdatabase = "MDB Y-Z" } } #Move mailbox to the correct database if not already correct. if (($mailbox.database.name) -ne $mailboxdatabase) {New-MoveRequest -Identity $mailbox -TargetDatabase $mailboxdatabase;Write-Host "Moving $displayname to $mailboxdatabase" -ForegroundColor Green} }
combined_dataset/train/non-malicious/834.ps1
834.ps1
class AsrCommon { [psobject]$Logger AsrCommon($logger) { $this.Logger = $logger } [psobject] GetAndEnsureVaultContext($vaultName) { $this.Logger.LogTrace("Ensuring services vault context '$($vaultName)'") $targetVault = Get-AzureRmRecoveryServicesVault -Name $vaultName if ($targetVault -eq $null) { $this.Logger.LogError("Vault with name '$($vaultName)' unable to find") } Set-AzureRmRecoveryServicesAsrVaultContext -Vault $targetVault return $targetVault } [psobject] GetFabricServer($sourceConfigurationServer) { $this.Logger.LogTrace("Getting fabric server for configuration server '$($sourceConfigurationServer)'") $fabricServer = Get-AzureRmRecoveryServicesAsrFabric -FriendlyName $sourceConfigurationServer return $fabricServer } [psobject] GetProtectionContainer($fabricServer) { $this.Logger.LogTrace("Getting protection container reference for fabric server '$($fabricServer.Name)-$($fabricServer.FriendlyName)'") $protectionContainer = Get-AzureRmRecoveryServicesAsrProtectionContainer -Fabric $fabricServer return $protectionContainer } [psobject] GetProtectableItem($protectionContainer, $sourceMachineName) { $this.Logger.LogTrace("Getting protectable item reference '$($sourceMachineName)'") $protectableVM = Get-AzureRmRecoveryServicesAsrProtectableItem ` -ProtectionContainer $protectionContainer ` -FriendlyName $sourceMachineName return $protectableVM } [psobject] GetProtectedItem($protectionContainer, $sourceMachineName) { $this.Logger.LogTrace("Getting protected item reference '$($sourceMachineName)'") $protectedItem = Get-AzureRmRecoveryServicesAsrReplicationProtectedItem ` -ProtectionContainer $protectionContainer ` -FriendlyName $sourceMachineName return $protectedItem } [psobject] GetProtectedItemFromVault($vaultName, $sourceMachineName, $sourceConfigurationServer) { $vaultServer = $this.GetAndEnsureVaultContext($vaultName) $fabricServer = $this.GetFabricServer($sourceConfigurationServer) $protectionContainer = $this.GetProtectionContainer($fabricServer) $protectableVM = $this.GetProtectableItem($protectionContainer, $sourceMachineName) $this.Logger.LogTrace("ProtectableStatus: '$($protectableVM.ProtectionStatus)'") if ($protectableVM.ReplicationProtectedItemId -ne $null) { $protectedItem = $this.GetProtectedItem($protectionContainer, $sourceMachineName) $this.Logger.LogTrace("ProtectionState: '$($protectedItem.ProtectionState)'") $this.Logger.LogTrace("ProtectionDescription: '$($protectedItem.ProtectionStateDescription)'") return $protectedItem } else { $this.Logger.LogTrace("'$($sourceMachineName)' protectable item is not in a protected state ready for replication") return $null } } } Function New-AsrCommonInstance($Logger) { return [AsrCommon]::new($Logger) }
combined_dataset/train/non-malicious/1101.ps1
1101.ps1
function Start-TestFixture { & (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve) } function Test-ShouldGetAllMimeTypes { $mimeMap = Get-IisMimeMap Assert-NotNull $mimeMap Assert-True ($mimeMap.Length -gt 0) $mimeMap | ForEach-Object { Assert-True ($_.FileExtension -like '.*') ('invalid file extension ''{0}''' -f $_.FileExtension) Assert-True ($_.MimeType -like '*/*') 'invalid mime type' } } function Test-ShouldGetWildcardFileExtension { $mimeMap = Get-IisMimeMap -FileExtension '.htm*' Assert-NotNull $mimeMap Assert-Equal 2 $mimeMap.Length Assert-Equal '.htm' $mimeMap[0].FileExtension Assert-Equal 'text/html' $mimeMap[0].MimeType Assert-Equal '.html' $mimeMap[1].FileExtension Assert-Equal 'text/html' $mimeMap[1].MimeType } function Test-ShouldGetWildcardMimeType { $mimeMap = Get-IisMimeMap -MimeType 'text/*' Assert-NotNull $mimeMap Assert-True ($mimeMap.Length -gt 1) $mimeMap | ForEach-Object { Assert-True ($_.MimeType -like 'text/*') } }
combined_dataset/train/non-malicious/3900.ps1
3900.ps1
function Test-GetNonExistingBatchAccount { Assert-Throws { Get-AzBatchAccount -Name "accountthatdoesnotexist" } } function Test-BatchAccountEndToEnd { $accountName = Get-BatchAccountName $resourceGroup = Get-ResourceGroupName try { $location = Get-BatchAccountProviderLocation $tagName = "tag1" $tagValue = "tagValue1" New-AzResourceGroup -Name $resourceGroup -Location $location $createdAccount = New-AzBatchAccount -Name $accountName -ResourceGroupName $resourceGroup -Location $location -Tag @{$tagName = $tagValue} Assert-AreEqual $accountName $createdAccount.AccountName Assert-AreEqual $resourceGroup $createdAccount.ResourceGroupName Assert-AreEqual $location $createdAccount.Location Assert-AreEqual 1 $createdAccount.Tags.Count Assert-AreEqual $tagValue $createdAccount.Tags[$tagName] Assert-True { $createdAccount.DedicatedCoreQuota -gt 0 } Assert-True { $createdAccount.LowPriorityCoreQuota -gt 0 } Assert-True { $createdAccount.PoolQuota -gt 0 } Assert-True { $createdAccount.ActiveJobAndJobScheduleQuota -gt 0 } $newTagName = "tag2" $newTagValue = "tagValue2" Set-AzBatchAccount -Name $accountName -ResourceGroupName $resourceGroup -Tag @{$newTagName = $newTagValue} $updatedAccount = Get-AzBatchAccount -Name $accountName -ResourceGroupName $resourceGroup Assert-AreEqual $accountName $updatedAccount.AccountName Assert-AreEqual 1 $updatedAccount.Tags.Count Assert-AreEqual $newTagValue $updatedAccount.Tags[$newTagName] $accountWithKeys = Get-AzBatchAccountKeys -Name $accountName Assert-NotNull $accountWithKeys.PrimaryAccountKey Assert-NotNull $accountWithKeys.SecondaryAccountKey $accountWithKeys = Get-AzBatchAccountKeys -Name $accountName -ResourceGroupName $resourceGroup Assert-NotNull $accountWithKeys.PrimaryAccountKey Assert-NotNull $accountWithKeys.SecondaryAccountKey $updatedKey = New-AzBatchAccountKey -Name $accountName -ResourceGroupName $resourceGroup -KeyType Primary Assert-NotNull $updatedKey.PrimaryAccountKey Assert-AreNotEqual $accountWithKeys.PrimaryAccountKey $updatedKey.PrimaryAccountKey Assert-AreEqual $accountWithKeys.SecondaryAccountKey $updatedKey.SecondaryAccountKey } finally { try { Remove-AzBatchAccount -Name $accountName -ResourceGroupName $resourceGroup -Force $errorMessage = "The specified account does not exist." Assert-ThrowsContains { Get-AzBatchAccount -Name $accountName -ResourceGroupName $resourceGroup } $errorMessage } finally { Remove-AzResourceGroup $resourceGroup } } } function Test-GetBatchSupportedImage { $context = New-Object Microsoft.Azure.Commands.Batch.Test.ScenarioTests.ScenarioTestContext $supportedImages = Get-AzBatchSupportedImage -BatchContext $context foreach($supportedImage in $supportedImages) { Assert-True { $supportedImage.NodeAgentSkuId.StartsWith("batch.node") } Assert-True { $supportedImage.OSType -in "linux","windows" } Assert-AreNotEqual $null $supportedImage.VerificationType } }
combined_dataset/train/non-malicious/Dir for days_2.ps1
Dir for days_2.ps1
Function Create-DatePaths { Param ( [Parameter(Position=0,Mandatory=$True)] [DateTime] $Start, [Parameter(Position=1,Mandatory=$True)] [ValidateScript({$_ -gt $Start})] [DateTime] $End, $DestinationPath=(Join-Path $env:UserProfile "Test") ) 0..(New-TimeSpan $Start $End).Days | % { $TargetPath = Join-Path $DestinationPath $(Get-Date $Start -Format "yyyy\\\\MM-MMMM\\\\yyyy-MM-dd") If (!(Test-Path $TargetPath)) { New-Item $TargetPath -ItemType Directory } $Start = $Start.AddDays(1) } }
combined_dataset/train/non-malicious/sample_31_97.ps1
sample_31_97.ps1
# # Module manifest for module 'OCI.PSModules.Aispeech' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Aispeech.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '101b9a53-66d0-4458-870f-5f2f3debb208' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Aispeech Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aispeech.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAispeechTranscriptionJob', 'Get-OCIAispeechTranscriptionJobsList', 'Get-OCIAispeechTranscriptionTask', 'Get-OCIAispeechTranscriptionTasksList', 'Move-OCIAispeechTranscriptionJobCompartment', 'New-OCIAispeechTranscriptionJob', 'Remove-OCIAispeechTranscriptionJob', 'Stop-OCIAispeechTranscriptionJob', 'Stop-OCIAispeechTranscriptionTask', 'Update-OCIAispeechTranscriptionJob' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aispeech' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/631.ps1
631.ps1
param( [string]$Version, [string]$Path, [switch]$Force, $Update, [switch]$Uninstall ) $Configs = @{ Url = "https://bitbucket.org/splatteredbits/carbon/downloads/Carbon-1.7.0.zip" Path = "$(Split-Path -Path $MyInvocation.MyCommand.Definition -Parent)\" } $Configs | ForEach-Object{ try{ $_.Result = $null if(-not $_.Path){$_.Path = $Path} $Config = $_ if(-not $Uninstall){ if($_.ConditionExclusion){ $_.ConditionExclusionResult = $(Invoke-Expression $Config.ConditionExclusion -ErrorAction SilentlyContinue) } if(($_.ConditionExclusionResult -eq $null) -or $Force){ $_.Downloads = $_.Url | ForEach-Object{ Get-File -Url $_ -Path (Join-Path $Config.Path "Carbon.zip") } $ModulePath = (Join-Path $env:PSModulePath.Split(";")[0] "Carbon") if(Test-Path $ModulePath){ Remove-Item $ModulePath -Force -Recurse } New-Item -Path $ModulePath -ItemType Directory $_.Downloads | ForEach-Object{ Unzip-File -File $(Join-Path $_.Path $_.Filename) -Destination $ModulePath } Move-Item -Path "$ModulePath\Carbon\*" -Destination $ModulePath -ErrorAction SilentlyContinue $_.Downloads | ForEach-Object{ Remove-Item $(Join-Path $_.Path $_.Filename) } if($Update){$_.Result = "AppUpdated";$_ }else{$_.Result = "AppInstalled";$_} }else{ $_.Result = "ConditionExclusion";$_ } }else{ $ModulePath = (Join-Path $env:PSModulePath.Split(";")[0] "Carbon");if(Test-Path $ModulePath){Remove-Item -Path $ModulePath -Force -Recurse} $_.Result = "AppUninstalled";$_ } }catch{ $Config.Result = "Error";$Config } }
combined_dataset/train/non-malicious/3416.ps1
3416.ps1
function Test-AzureProvider { $defaultProviders = Get-AzureRmResourceProvider Assert-True { $defaultProviders.Length -gt 0 } $allProviders = Get-AzureRmResourceProvider -ListAvailable Assert-True { $allProviders.Length -gt $defaultProviders.Length } $ErrorActionPreference = "SilentlyContinue" $Error.Clear() $nonProviders = Get-AzureRmResourceProvider -Location "abc" Assert-True { $Error[0].Contains("Provided location is not supported") } Assert-True { $nonProviders.Length -eq 0 } $ErrorActionPreference = "Stop" $globalProviders = Get-AzureRmResourceProvider -Location "global" Assert-True { $globalProviders.Length -gt 0 } Register-AzureRmResourceProvider -ProviderNamespace "Microsoft.ApiManagement" $endTime = [DateTime]::UtcNow.AddMinutes(5) while ([DateTime]::UtcNow -lt $endTime -and @(Get-AzureRmResourceProvider -ProviderNamespace "Microsoft.ApiManagement")[0].RegistrationState -ne "Registered") { [Microsoft.WindowsAzure.Commands.Utilities.Common.TestMockSupport]::Delay(1000) } $provider = Get-AzureRmResourceProvider -ProviderNamespace "Microsoft.ApiManagement" Assert-True { $provider[0].RegistrationState -eq "Registered" } Unregister-AzureRmResourceProvider -ProviderNamespace "Microsoft.ApiManagement" while ([DateTime]::UtcNow -lt $endTime -and @(Get-AzureRmResourceProvider -ProviderNamespace "Microsoft.ApiManagement")[0].RegistrationState -ne "Unregistered") { [Microsoft.WindowsAzure.Commands.Utilities.Common.TestMockSupport]::Delay(1000) } $provider = Get-AzureRmResourceProvider -ProviderNamespace "Microsoft.ApiManagement" Assert-True { $provider[0].RegistrationState -eq "Unregistered" } } function Test-AzureProvider-WithZoneMappings { $testProvider = Get-AzureRmResourceProvider -ProviderNamespace "Providers.Test" Assert-True { $testProvider.Count -gt 0 } $statefulResources = $testProvider | where-object {$_.ResourceTypes.ResourceTypeName -contains "statefulResources"} Assert-NotNull { $statefulResources } Assert-NotNull { $statefulResources.ZoneMappings } Assert-True { $statefulResources.ZoneMappings.Count -eq 2 } Assert-True { $statefulResources.ZoneMappings["West Europe"] -contains "3"} } function Test-AzureProviderOperation { $allActions = Get-AzureRmProviderOperation * Assert-True { $allActions.Length -gt 0 } $insightsActions = Get-AzureRmProviderOperation Microsoft.Insights/* $insightsActions Assert-True { $insightsActions.Length -gt 0 } Assert-True { $allActions.Length -gt $insightsActions.Length } $nonInsightsActions = $allActions | Where-Object { $_.Operation.ToLower().StartsWith("microsoft.insights/") -eq $false } $actualLength = $allActions.Length - $nonInsightsActions.Length; $expectedLength = $insightsActions.Length; Assert-True { $actualLength -eq $expectedLength } foreach ($action in $insightsActions) { Assert-True { $action.Operation.ToLower().StartsWith("microsoft.insights/"); } } $insightsCaseActions = Get-AzureRmProviderOperation MicROsoFt.InSIghTs/* Assert-True { $insightsCaseActions.Length -gt 0 } Assert-True { $insightsCaseActions.Length -eq $insightsActions.Length } foreach ($action in $insightsCaseActions) { Assert-True { $action.Operation.ToLower().Startswith("microsoft.insights/"); } } $insightsReadActions = Get-AzureRmProviderOperation Microsoft.Insights/*/read Assert-True { $insightsReadActions.Length -gt 0 } Assert-True { $insightsActions.Length -gt $insightsReadActions.Length } foreach ($action in $insightsReadActions) { Assert-True { $action.Operation.ToLower().EndsWith("/read"); } Assert-True { $action.Operation.ToLower().StartsWith("microsoft.insights/");} } $readActions = Get-AzureRmProviderOperation */read Assert-True { $readActions.Length -gt 0 } Assert-True { $readActions.Length -lt $allActions.Length } Assert-True { $readActions.Length -gt $insightsReadActions.Length } foreach ($action in $readActions) { Assert-True { $action.Operation.ToLower().EndsWith("/read"); } } $action = Get-AzureRmProviderOperation Microsoft.OperationalInsights/workspaces/usages/read Assert-AreEqual $action.Operation.ToLower() "Microsoft.OperationalInsights/workspaces/usages/read".ToLower(); $action = Get-AzureRmProviderOperation Microsoft.OperationalInsights/workspaces/usages/read/123 Assert-True { $action.Length -eq 0 } $exceptionMessage = "Provider NonExistentProvider not found."; Assert-Throws { Get-AzureRmProviderOperation NonExistentProvider/* } $exceptionMessage Assert-Throws { Get-AzureRmProviderOperation NonExistentProvider/servers/read } $exceptionMessage $exceptionMessage = "Individual parts in the search string should either equal * or not contain *."; Assert-Throws {Get-AzureRmProviderOperation Microsoft.ClassicCompute/virtual*/read } $exceptionMessage $exceptionMessage = "To get all operations under Microsoft.Sql, please specify the search string as Microsoft.Sql/*."; Assert-Throws {Get-AzureRmProviderOperation Microsoft.Sql } $exceptionMessage $exceptionMessage = "Wildcard character ? is not supported."; Assert-Throws {Get-AzureRmProviderOperation Microsoft.Sql/servers/*/rea? } $exceptionMessage }
combined_dataset/train/non-malicious/2527.ps1
2527.ps1
function New-CodeSigningCertificate { [CmdletBinding()] param( [Security.Cryptography.X509Certificates.X500DistinguishedName]$Subject = "CN=PowerGUI User", [ValidateSet(1024,2048)] [int]$KeyLength = 2048, [DateTime]$ValidFrom = [datetime]::Now, [DateTime]$ValidTo = [datetime]::Now.AddYears(1) ) $signature = @" [DllImport("advapi32.dll", CharSet=CharSet.Auto, SetLastError=true)] public static extern bool CryptAcquireContext( ref IntPtr phProv, string pszContainer, string pszProvider, uint dwProvType, Int64 dwFlags ); [DllImport("advapi32.dll", CharSet=CharSet.Auto, SetLastError=true)] public static extern bool CryptReleaseContext( IntPtr phProv, int flags ); [DllImport("advapi32.dll", CharSet=CharSet.Auto, SetLastError=true)] public static extern bool CryptGenKey( IntPtr phProv, int Algid, int dwFlags, ref IntPtr phKey ); [DllImport("Crypt32.dll", CharSet=CharSet.Auto, SetLastError=true)] public static extern bool CryptExportPublicKeyInfo( IntPtr phProv, int dwKeySpec, int dwCertEncodingType, IntPtr pbInfo, ref int pcbInfo ); [DllImport("Crypt32.dll", CharSet=CharSet.Auto, SetLastError=true)] public static extern bool CryptHashPublicKeyInfo( IntPtr phProv, int Algid, int dwFlags, int dwCertEncodingType, IntPtr pInfo, IntPtr pbComputedHash, ref int pcbComputedHash ); [DllImport("Crypt32.dll", SetLastError=true)] public static extern bool CryptEncodeObject( int dwCertEncodingType, [MarshalAs(UnmanagedType.LPStr)]string lpszStructType, ref CRYPTOAPI_BLOB pvStructInfo, byte[] pbEncoded, ref int pcbEncoded ); [DllImport("Crypt32.dll", CharSet=CharSet.Auto, SetLastError=true)] public static extern IntPtr CertCreateSelfSignCertificate( IntPtr phProv, CRYPTOAPI_BLOB pSubjectIssuerBlob, int flags, CRYPT_KEY_PROV_INFO pKeyProvInfo, IntPtr pSignatureAlgorithm, SystemTime pStartTime, SystemTime pEndTime, CERT_EXTENSIONS pExtensions ); [DllImport("advapi32.dll", CharSet=CharSet.Auto, SetLastError=true)] public static extern bool CryptDestroyKey( IntPtr cryptKeyHandle ); [DllImport("kernel32.dll", CharSet=CharSet.Auto, SetLastError=true)] public static extern bool FileTimeToSystemTime( [In] ref long fileTime, out SystemTime SystemTime ); [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)] public struct CRYPT_KEY_PROV_INFO { public string pwszContainerName; public string pwszProvName; public int dwProvType; public int dwFlags; public int cProvParam; public IntPtr rgProvParam; public int dwKeySpec; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)] public struct CERT_EXTENSIONS { public int cExtension; public IntPtr rgExtension; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)] public struct CERT_EXTENSION { [MarshalAs(UnmanagedType.LPStr)]public String pszObjId; public Boolean fCritical; public CRYPTOAPI_BLOB Value; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)] public struct CERT_BASIC_CONSTRAINTS2_INFO { public Boolean fCA; public Boolean fPathLenConstraint; public int dwPathLenConstraint; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)] public struct CRYPTOAPI_BLOB { public int cbData; public IntPtr pbData; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)] public struct CRYPT_BIT_BLOB { public uint cbData; public IntPtr pbData; public uint cUnusedBits; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)] public struct CERT_PUBLIC_KEY_INFO { public CRYPT_ALGORITHM_IDENTIFIER Algorithm; public CRYPT_BIT_BLOB PublicKey; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)] public struct CRYPT_ALGORITHM_IDENTIFIER { [MarshalAs(UnmanagedType.LPStr)]public String pszObjId; public CRYPTOAPI_BLOB Parameters; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)] public struct SystemTime { public short Year; public short Month; public short DayOfWeek; public short Day; public short Hour; public short Minute; public short Second; public short Milliseconds; } "@ Add-Type -MemberDefinition $signature -Namespace Quest -Name PowerGUI $pszContainer = [Guid]::NewGuid().ToString() [IntPtr]$phProv = [IntPtr]::Zero $Provider = "Microsoft Base Cryptographic Provider v1.0" $Result = [Quest.PowerGUI]::CryptAcquireContext([ref]$phProv,$pszContainer,$Provider,0x1,0x8) if (!$Result) {Write-Warning "Unable to create provider context!"; return} [IntPtr]$phKey = [IntPtr]::Zero if ($KeyLength -eq 2048) { $Result = [Quest.PowerGUI]::CryptGenKey($phProv,2,0x08000001,[ref]$phKey) } else { $Result = [Quest.PowerGUI]::CryptGenKey($phProv,2,0x04000001,[ref]$phKey) } if (!$Result) {Write-Warning "Unable to create key context!"; return} $dataHandle = [Runtime.InteropServices.GCHandle]::Alloc($Subject.RawData,"pinned") $ptrName = New-Object Quest.PowerGUI+CRYPTOAPI_BLOB -Property @{ cbData = $Subject.RawData.Count; pbData = $dataHandle.AddrOfPinnedObject() } $PrivateKey = New-Object Quest.PowerGUI+CRYPT_KEY_PROV_INFO -Property @{ pwszContainerName = $pszContainer; pwszProvName = $Provider; dwProvType = 1; dwKeySpec = 2 } $Extensions = New-Object Security.Cryptography.X509Certificates.X509ExtensionCollection [void]$Extensions.Add((New-Object Security.Cryptography.X509Certificates.X509BasicConstraintsExtension $false,$false,0,$false)) $OIDs = New-Object Security.Cryptography.OidCollection [void]$OIDs.Add("code signing") [void]$Extensions.Add((New-Object Security.Cryptography.X509Certificates.X509EnhancedKeyUsageExtension -ArgumentList $OIDs, $false)) $pcbInfo = 0 if (([Quest.PowerGUI]::CryptExportPublicKeyInfo($phProv,2,1,[IntPtr]::Zero,[ref]$pcbInfo))) { $pbInfo = [Runtime.InteropServices.Marshal]::AllocHGlobal($pcbInfo) $Return = [Quest.PowerGUI]::CryptExportPublicKeyInfo($phProv,2,1,$pbInfo,[ref]$pcbInfo) $pcbComputedHash = 0 if (([Quest.PowerGUI]::CryptHashPublicKeyInfo([IntPtr]::Zero,0x00008004,0,1,$pbInfo,[IntPtr]::Zero,[ref]$pcbComputedHash))) { $pbComputedHash = [Runtime.InteropServices.Marshal]::AllocHGlobal($pcbComputedHash) [void][Quest.PowerGUI]::CryptHashPublicKeyInfo([IntPtr]::Zero,0x00008004,0,1,$pbInfo,$pbComputedHash,[ref]$pcbComputedHash) $pcbEncoded = 0 $uSKI = New-Object Quest.PowerGUI+CRYPTOAPI_BLOB -Property @{ cbData = $pcbComputedHash; pbData = $pbComputedHash } $pcbEncoded = 0 if (([Quest.PowerGUI]::CryptEncodeObject(1,"2.5.29.14",[ref]$uSKI,$null,[ref]$pcbEncoded))) { $pbEncoded = New-Object byte[] -ArgumentList $pcbEncoded $Return = [Quest.PowerGUI]::CryptEncodeObject(1,"2.5.29.14",[ref]$uSKI,$pbEncoded,[ref]$pcbEncoded) $AsnEncodedData = New-Object Security.Cryptography.AsnEncodedData -ArgumentList "2.5.29.14", $pbEncoded [void]$Extensions.Add((New-Object Security.Cryptography.X509Certificates.X509SubjectKeyIdentifierExtension -ArgumentList $AsnEncodedData, $false)) } } } [void]$Extensions.Add((New-Object Security.Cryptography.X509Certificates.X509KeyUsageExtension -ArgumentList "DigitalSignature", $true)) $uExtensionCollection = @() foreach ($mExt in $Extensions) { $uExtension = New-Object Quest.PowerGUI+CERT_EXTENSION $uExtension.pszObjId = $mExt.Oid.Value $uExtension.fCritical = $mExt.Critical $value = New-Object Quest.PowerGUI+CRYPTOAPI_BLOB $value.cbData = $mExt.RawData.Length $value.pbData = [Runtime.InteropServices.Marshal]::AllocHGlobal($value.cbData) [Runtime.InteropServices.Marshal]::Copy($mExt.RawData,0,$Value.pbData,$Value.cbData) $uExtension.Value = $value $uExtensionCollection += $uExtension } $uExtensions = New-Object Quest.PowerGUI+CERT_EXTENSIONS $ExtensionSize = [Runtime.InteropServices.Marshal]::SizeOf([Quest.PowerGUI+CERT_EXTENSION]) * $Extensions.Count $uExtensions.cExtension = $Extensions.Count $uExtensions.rgExtension = [Runtime.InteropServices.Marshal]::AllocHGlobal($ExtensionSize) for ($n = 0; $n -lt $Extensions.Count; ++$n) { $offset = $n * [Runtime.InteropServices.Marshal]::SizeOf([Quest.PowerGUI+CERT_EXTENSION]) $next = $offset + $uExtensions.rgExtension.ToInt64() [IntPtr]$NextAddress = New-Object IntPtr $next [Runtime.InteropServices.Marshal]::StructureToPtr($uExtensionCollection[$n],$NextAddress,$false) } $pStartTime = New-Object Quest.PowerGUI+SystemTime [void][Quest.PowerGUI]::FileTimeToSystemTime([ref]$ValidFrom.ToFileTime(),[ref]$pStartTime) $pEndTime = New-Object Quest.PowerGUI+SystemTime [void][Quest.PowerGUI]::FileTimeToSystemTime([ref]$ValidTo.ToFileTime(),[ref]$pEndTime) $pvContext = [Quest.PowerGUI]::CertCreateSelfSignCertificate($phProv,$ptrName,0,$PrivateKey,[IntPtr]::Zero,$pStartTime,$pEndTime,$uExtensions) if (!$pvContext.Equals([IntPtr]::Zero)) { New-Object Security.Cryptography.X509Certificates.X509Certificate2 -ArgumentList $pvContext } foreach ($uExt in $uExtensionCollection) { [void][Runtime.InteropServices.Marshal]::FreeHGlobal($uExt.Value.pbData) } [void][Runtime.InteropServices.Marshal]::FreeHGlobal($uExtensions.rgExtension) [void][Runtime.InteropServices.Marshal]::FreeHGlobal($pbInfo) [void][Runtime.InteropServices.Marshal]::FreeHGlobal($pbComputedHash) [void]$dataHandle.Free() [void][Quest.PowerGUI]::CryptDestroyKey($phKey) [void][Quest.PowerGUI]::CryptReleaseContext($phProv,0) }
combined_dataset/train/non-malicious/sample_58_40.ps1
sample_58_40.ps1
param( [Parameter(Mandatory = $true)][string] $InputPath, # Full path to directory where NuGet packages to be checked are stored [Parameter(Mandatory = $true)][string] $ExtractPath, # Full path to directory where the packages will be extracted during validation [Parameter(Mandatory = $true)][string] $DotnetSymbolVersion, # Version of dotnet symbol to use [Parameter(Mandatory = $false)][switch] $CheckForWindowsPdbs, # If we should check for the existence of windows pdbs in addition to portable PDBs [Parameter(Mandatory = $false)][switch] $ContinueOnError, # If we should keep checking symbols after an error [Parameter(Mandatory = $false)][switch] $Clean, # Clean extracted symbols directory after checking symbols [Parameter(Mandatory = $false)][string] $SymbolExclusionFile # Exclude the symbols in the file from publishing to symbol server ) . $PSScriptRoot\..\tools.ps1 # Maximum number of jobs to run in parallel $MaxParallelJobs = 16 # Max number of retries $MaxRetry = 5 # Wait time between check for system load $SecondsBetweenLoadChecks = 10 # Set error codes Set-Variable -Name "ERROR_BADEXTRACT" -Option Constant -Value -1 Set-Variable -Name "ERROR_FILEDOESNOTEXIST" -Option Constant -Value -2 $WindowsPdbVerificationParam = "" if ($CheckForWindowsPdbs) { $WindowsPdbVerificationParam = "--windows-pdbs" } $ExclusionSet = New-Object System.Collections.Generic.HashSet[string]; if (!$InputPath -or !(Test-Path $InputPath)){ Write-Host "No symbols to validate." ExitWithExitCode 0 } #Check if the path exists if ($SymbolExclusionFile -and (Test-Path $SymbolExclusionFile)){ [string[]]$Exclusions = Get-Content "$SymbolExclusionFile" $Exclusions | foreach { if($_ -and $_.Trim()){$ExclusionSet.Add($_)} } } else{ Write-Host "Symbol Exclusion file does not exists. No symbols to exclude." } $CountMissingSymbols = { param( [string] $PackagePath, # Path to a NuGet package [string] $WindowsPdbVerificationParam # If we should check for the existence of windows pdbs in addition to portable PDBs ) Add-Type -AssemblyName System.IO.Compression.FileSystem Write-Host "Validating $PackagePath " # Ensure input file exist if (!(Test-Path $PackagePath)) { Write-PipelineTaskError "Input file does not exist: $PackagePath" return [pscustomobject]@{ result = $using:ERROR_FILEDOESNOTEXIST packagePath = $PackagePath } } # Extensions for which we'll look for symbols $RelevantExtensions = @('.dll', '.exe', '.so', '.dylib') # How many files are missing symbol information $MissingSymbols = 0 $PackageId = [System.IO.Path]::GetFileNameWithoutExtension($PackagePath) $PackageGuid = New-Guid $ExtractPath = Join-Path -Path $using:ExtractPath -ChildPath $PackageGuid $SymbolsPath = Join-Path -Path $ExtractPath -ChildPath 'Symbols' try { [System.IO.Compression.ZipFile]::ExtractToDirectory($PackagePath, $ExtractPath) } catch { Write-Host "Something went wrong extracting $PackagePath" Write-Host $_ return [pscustomobject]@{ result = $using:ERROR_BADEXTRACT packagePath = $PackagePath } } Get-ChildItem -Recurse $ExtractPath | Where-Object { $RelevantExtensions -contains $_.Extension } | ForEach-Object { $FileName = $_.FullName if ($FileName -Match '\\ref\\') { Write-Host "`t Ignoring reference assembly file " $FileName return } $FirstMatchingSymbolDescriptionOrDefault = { param( [string] $FullPath, # Full path to the module that has to be checked [string] $TargetServerParam, # Parameter to pass to `Symbol Tool` indicating the server to lookup for symbols [string] $WindowsPdbVerificationParam, # Parameter to pass to potential check for windows-pdbs. [string] $SymbolsPath ) $FileName = [System.IO.Path]::GetFileName($FullPath) $Extension = [System.IO.Path]::GetExtension($FullPath) # Those below are potential symbol files that the `dotnet symbol` might # return. Which one will be returned depend on the type of file we are # checking and which type of file was uploaded. # The file itself is returned $SymbolPath = $SymbolsPath + '\' + $FileName # PDB file for the module $PdbPath = $SymbolPath.Replace($Extension, '.pdb') # PDB file for R2R module (created by crossgen) $NGenPdb = $SymbolPath.Replace($Extension, '.ni.pdb') # DBG file for a .so library $SODbg = $SymbolPath.Replace($Extension, '.so.dbg') # DWARF file for a .dylib $DylibDwarf = $SymbolPath.Replace($Extension, '.dylib.dwarf') $dotnetSymbolExe = "$env:USERPROFILE\.dotnet\tools" $dotnetSymbolExe = Resolve-Path "$dotnetSymbolExe\dotnet-symbol.exe" $totalRetries = 0 while ($totalRetries -lt $using:MaxRetry) { # Save the output and get diagnostic output $output = & $dotnetSymbolExe --symbols --modules $WindowsPdbVerificationParam $TargetServerParam $FullPath -o $SymbolsPath --diagnostics | Out-String if ((Test-Path $PdbPath) -and (Test-path $SymbolPath)) { return 'Module and PDB for Module' } elseif ((Test-Path $NGenPdb) -and (Test-Path $PdbPath) -and (Test-Path $SymbolPath)) { return 'Dll, PDB and NGen PDB' } elseif ((Test-Path $SODbg) -and (Test-Path $SymbolPath)) { return 'So and DBG for SO' } elseif ((Test-Path $DylibDwarf) -and (Test-Path $SymbolPath)) { return 'Dylib and Dwarf for Dylib' } elseif (Test-Path $SymbolPath) { return 'Module' } else { $totalRetries++ } } return $null } $FileRelativePath = $FileName.Replace("$ExtractPath\", "") if (($($using:ExclusionSet) -ne $null) -and ($($using:ExclusionSet).Contains($FileRelativePath) -or ($($using:ExclusionSet).Contains($FileRelativePath.Replace("\", "/"))))){ Write-Host "Skipping $FileName from symbol validation" } else { $FileGuid = New-Guid $ExpandedSymbolsPath = Join-Path -Path $SymbolsPath -ChildPath $FileGuid $SymbolsOnMSDL = & $FirstMatchingSymbolDescriptionOrDefault ` -FullPath $FileName ` -TargetServerParam '--microsoft-symbol-server' ` -SymbolsPath "$ExpandedSymbolsPath-msdl" ` -WindowsPdbVerificationParam $WindowsPdbVerificationParam $SymbolsOnSymWeb = & $FirstMatchingSymbolDescriptionOrDefault ` -FullPath $FileName ` -TargetServerParam '--internal-server' ` -SymbolsPath "$ExpandedSymbolsPath-symweb" ` -WindowsPdbVerificationParam $WindowsPdbVerificationParam Write-Host -NoNewLine "`t Checking file " $FileName "... " if ($SymbolsOnMSDL -ne $null -and $SymbolsOnSymWeb -ne $null) { Write-Host "Symbols found on MSDL ($SymbolsOnMSDL) and SymWeb ($SymbolsOnSymWeb)" } else { $MissingSymbols++ if ($SymbolsOnMSDL -eq $null -and $SymbolsOnSymWeb -eq $null) { Write-Host 'No symbols found on MSDL or SymWeb!' } else { if ($SymbolsOnMSDL -eq $null) { Write-Host 'No symbols found on MSDL!' } else { Write-Host 'No symbols found on SymWeb!' } } } } } if ($using:Clean) { Remove-Item $ExtractPath -Recurse -Force } Pop-Location return [pscustomobject]@{ result = $MissingSymbols packagePath = $PackagePath } } function CheckJobResult( $result, $packagePath, [ref]$DupedSymbols, [ref]$TotalFailures) { if ($result -eq $ERROR_BADEXTRACT) { Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "$packagePath has duplicated symbol files" $DupedSymbols.Value++ } elseif ($result -eq $ERROR_FILEDOESNOTEXIST) { Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "$packagePath does not exist" $TotalFailures.Value++ } elseif ($result -gt '0') { Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "Missing symbols for $result modules in the package $packagePath" $TotalFailures.Value++ } else { Write-Host "All symbols verified for package $packagePath" } } function CheckSymbolsAvailable { if (Test-Path $ExtractPath) { Remove-Item $ExtractPath -Force -Recurse -ErrorAction SilentlyContinue } $TotalPackages = 0 $TotalFailures = 0 $DupedSymbols = 0 Get-ChildItem "$InputPath\*.nupkg" | ForEach-Object { $FileName = $_.Name $FullName = $_.FullName # These packages from Arcade-Services include some native libraries that # our current symbol uploader can't handle. Below is a workaround until # we get issue: https://github.com/dotnet/arcade/issues/2457 sorted. if ($FileName -Match 'Microsoft\.DotNet\.Darc\.') { Write-Host "Ignoring Arcade-services file: $FileName" Write-Host return } elseif ($FileName -Match 'Microsoft\.DotNet\.Maestro\.Tasks\.') { Write-Host "Ignoring Arcade-services file: $FileName" Write-Host return } $TotalPackages++ Start-Job -ScriptBlock $CountMissingSymbols -ArgumentList @($FullName,$WindowsPdbVerificationParam) | Out-Null $NumJobs = @(Get-Job -State 'Running').Count while ($NumJobs -ge $MaxParallelJobs) { Write-Host "There are $NumJobs validation jobs running right now. Waiting $SecondsBetweenLoadChecks seconds to check again." sleep $SecondsBetweenLoadChecks $NumJobs = @(Get-Job -State 'Running').Count } foreach ($Job in @(Get-Job -State 'Completed')) { $jobResult = Wait-Job -Id $Job.Id | Receive-Job CheckJobResult $jobResult.result $jobResult.packagePath ([ref]$DupedSymbols) ([ref]$TotalFailures) Remove-Job -Id $Job.Id } Write-Host } foreach ($Job in @(Get-Job)) { $jobResult = Wait-Job -Id $Job.Id | Receive-Job CheckJobResult $jobResult.result $jobResult.packagePath ([ref]$DupedSymbols) ([ref]$TotalFailures) } if ($TotalFailures -gt 0 -or $DupedSymbols -gt 0) { if ($TotalFailures -gt 0) { Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "Symbols missing for $TotalFailures/$TotalPackages packages" } if ($DupedSymbols -gt 0) { Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "$DupedSymbols/$TotalPackages packages had duplicated symbol files and could not be extracted" } ExitWithExitCode 1 } else { Write-Host "All symbols validated!" } } function InstallDotnetSymbol { $dotnetSymbolPackageName = 'dotnet-symbol' $dotnetRoot = InitializeDotNetCli -install:$true $dotnet = "$dotnetRoot\dotnet.exe" $toolList = & "$dotnet" tool list --global if (($toolList -like "*$dotnetSymbolPackageName*") -and ($toolList -like "*$dotnetSymbolVersion*")) { Write-Host "dotnet-symbol version $dotnetSymbolVersion is already installed." } else { Write-Host "Installing dotnet-symbol version $dotnetSymbolVersion..." Write-Host 'You may need to restart your command window if this is the first dotnet tool you have installed.' & "$dotnet" tool install $dotnetSymbolPackageName --version $dotnetSymbolVersion --verbosity "minimal" --global } } try { InstallDotnetSymbol foreach ($Job in @(Get-Job)) { Remove-Job -Id $Job.Id } CheckSymbolsAvailable } catch { Write-Host $_.ScriptStackTrace Write-PipelineTelemetryError -Category 'CheckSymbols' -Message $_ ExitWithExitCode 1 }
combined_dataset/train/non-malicious/sample_11_53.ps1
sample_11_53.ps1
##---------------------------------------------------------------------------- ## Copyright (c) Axis Communications AB, SWEDEN. All rights reserved. ##---------------------------------------------------------------------------- # Import string constants . ./StringConstants.ps1 # Import shared functions and vars . ./Commonalities.ps1 Stop-Service -Name $ServiceConstants.serviceName Remove-Service -ServiceToRemove $ServiceConstants.serviceName # Get temporary scoped Environment variables from ACS component framework $dataPath = Get-DataPath $installationPath = Get-InstallationPath # Remove files when stopped if its an axis path Remove-AxisDirectory -AxisFilePath $dataPath Remove-AxisDirectory -AxisFilePath $installationPath # SIG # Begin signature block # MIIoIQYJKoZIhvcNAQcCoIIoEjCCKA4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBpzVb2Ni4mr+so # HX7QJ3UIWzYSPUcVkmMxSFV/IfT8gaCCDY4wggawMIIEmKADAgECAhAIrUCyYNKc # TJ9ezam9k67ZMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV # BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0z # NjA0MjgyMzU5NTlaMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg # SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg # UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw # ggIKAoICAQDVtC9C0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0 # JAfhS0/TeEP0F9ce2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJr # Q5qZ8sU7H/Lvy0daE6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhF # LqGfLOEYwhrMxe6TSXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+F # LEikVoQ11vkunKoAFdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh # 3K3kGKDYwSNHR7OhD26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJ # wZPt4bRc4G/rJvmM1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQay # g9Rc9hUZTO1i4F4z8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbI # YViY9XwCFjyDKK05huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchAp # QfDVxW0mdmgRQRNYmtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRro # OBl8ZhzNeDhFMJlP/2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IB # WTCCAVUwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+ # YXsIiGX0TkIwHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0P # AQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAk # BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAC # hjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9v # dEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5j # b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAED # MAgGBmeBDAEEATANBgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql # +Eg08yy25nRm95RysQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFF # UP2cvbaF4HZ+N3HLIvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1h # mYFW9snjdufE5BtfQ/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3Ryw # YFzzDaju4ImhvTnhOE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5Ubdld # AhQfQDN8A+KVssIhdXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw # 8MzK7/0pNVwfiThV9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnP # LqR0kq3bPKSchh/jwVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatE # QOON8BUozu3xGFYHKi8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bn # KD+sEq6lLyJsQfmCXBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQji # WQ1tygVQK+pKHJ6l/aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbq # yK+p/pQd52MbOoZWeE4wggbWMIIEvqADAgECAhAILYwW0nV0JkMDtityXUvoMA0G # CSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg # SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg # UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwHhcNMjQwMjEyMDAwMDAwWhcNMjcwMjEx # MjM1OTU5WjBeMQswCQYDVQQGEwJTRTENMAsGA1UEBxMETHVuZDEfMB0GA1UEChMW # QXhpcyBDb21tdW5pY2F0aW9ucyBBQjEfMB0GA1UEAxMWQXhpcyBDb21tdW5pY2F0 # aW9ucyBBQjCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAOk0Sr22C6QH # zDpps6p3+m4c4HrGKW9dju1+awvCWpNnrTrCxxcqC7Fexgt3VVR2GfI+hEHrkSV9 # hq7tCT20No1s4OqGdB/FasUvqq8jCuoXKQQnd5gqFhFz/aL+1ocr2NvtCsxuNihB # UA3isiFf0R0uXcEIoi+tUiy0vJf5ZstopMEuSSOZlANhdWvwBTd8DL1EBYDp4Z/t # 1kWLax6NI8fim1MJxi5OaVUd1haFQMbzeBiwDXlMVJCyYcSVH7fuKCRhoem4pX1g # fdbM3yfhigegJPRui13ai6I69X71GoyRCBnkCgkrw8nUrOHGjrTe90sXLvVSU0Yu # j3VZzcDkdxN16tHG2SK3NT/7d5EmgrUSwabvS36sTRy0VeSCmop4ByDlTUCljGiP # cDO5viiyDF9SRbKa0BSuVAB9xtaaqjw9+sWRxiUqHVq8cRPOylBcziOMVFSE4ENc # aH3A55N2kb2tBalRm0GPfvB1wRzHdow/ArdGYB1FYIrBi2IUcUsgKwIDAQABo4IC # AzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHQYDVR0OBBYE # FCCITo81URSaUaiF+AwqLquw/5UcMD4GA1UdIAQ3MDUwMwYGZ4EMAQQBMCkwJwYI # KwYBBQUHAgEWG2h0dHA6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAOBgNVHQ8BAf8E # BAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwgbUGA1UdHwSBrTCBqjBToFGgT4ZN # aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0Q29kZVNp # Z25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5jcmwwU6BRoE+GTWh0dHA6Ly9jcmw0 # LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5 # NlNIQTM4NDIwMjFDQTEuY3JsMIGUBggrBgEFBQcBAQSBhzCBhDAkBggrBgEFBQcw # AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMFwGCCsGAQUFBzAChlBodHRwOi8v # Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmlu # Z1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJBgNVHRMEAjAAMA0GCSqGSIb3DQEB # CwUAA4ICAQBTl/rp/1EMC6RXuNwZmY8QNQpzSOODOmLbFU1hMlHq/iipWO+tsAnH # fB4CnZlrbgkVa64syckD29gWMrYp2PMdTwsL/vHmUI0lZj1pJ3zCvB5E+4CnKkhY # SIre1yukMyzbHR5y5X2bQ6kVtR0mkKqDTrT+vm6abBMmNcVwc+j5IJ9viHspncAs # X/t7gnYDmMnHCWTQwR01wNYypEbmpf5ZtF8233I5toy+x2TGBx7PToduYzxWiF9G # Hd18UNGuyNjsLPnHI0cY3vGNMo5GiaisR9e/CHYUq149MduRRifz9kkq8JA81k0j # +DEsZb8lOORoA7gte007xnesv35OL4ezbfhjkKYICGjRVSB/Xu8YhH04Xs6AbFWB # Boqi9/DH9RV3S0LH+JzxNIeDUw8LW7VNYrSOHWuRqPSazmtWll+MQUDV0p4LIUMl # EjoUNsRBvsDYSMiZSTNizMgyp437XDv25+iO8GMtiKlymsOPuKYALFVn0TJxdIet # ID0HnXa560C3FysEDxsGbVCI6L1l9j5RCmmF1qUs7o2oczvlDyplesA0sNOSlpJF # xyTgvlXXloxJCH7Yaz/2ItvhfMt1CZhMtyp38Y1yWlgMqSTrlJVxAcXHOXzu/mEM # aNvDTqF/zGnW5todKFHL092hQqm+8xGNOjL0C8G+ByZ2tzSh3y1R7jGCGekwghnl # AgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMUEw # PwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0IENvZGUgU2lnbmluZyBSU0E0MDk2 # IFNIQTM4NCAyMDIxIENBMQIQCC2MFtJ1dCZDA7Yrcl1L6DANBglghkgBZQMEAgEF # AKB8MBAGCisGAQQBgjcCAQwxAjAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE # MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCC8 # zpn/ICHg5yqsnPKbuMkmlTNOcU8e8bXR5Jl73q3ZXTANBgkqhkiG9w0BAQEFAASC # AYAl2sJKrfvadGgAzljkTovOfJWLOPdSB0UdoPUMtGpWXjFP9wX+4a+COI6SB2WV # NPipxUd/yI71SwJ3q3R4rcC/GUbpqKmwSy45R2vsvNrSkYNL7MYTbwaTKj+6hu7m # vahxwlAX4Mo+8AqOQdSmtcCfdRM8SYGPcOuEQXeJJNRmXSaB/MYw3XrbchR2XsUd # rxZPQH95UMMbePUbVjIw++qMRKDdS1LDfcJ7pZ14xSehtolNgvvFWwsZJTMbrNvI # WB5qb5ieuHksn73rWTiiCZbRvVJmXMsypxaTadR2EV8MTsm5+NBHm2uPaF3n+EMw # PbYGhTx6xKfzSW9kvvkFSCVmum0fxDDWoylpDBrSO7J/dRX/wKc9mBnAE+h/tly/ # GQBNSKBantVMW8TsiUfrhbpbrkyH6D1LkcFigGhlXMt8HuByYAlM2xlWfBk69iTm # JHe+qJpmse4TYspHhAveTFRCe0gv35PNzbRTWRt5skuTRPkkNDLmgvK4j1sXkuwv # L8ehghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG9w0BBwKgghcYMIIX # FAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEEoGgEZjBkAgEBBglg # hkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgN4QSSsXv021u0ZUzk3DINC7AY59k # wUo0OeF/62eq0GECEEeZ/t0ljquiXcuI5ojj/j4YDzIwMjQwOTIwMDk1NjM4WqCC # EwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCSqGSIb3DQEBCwUA # MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE # AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp # bmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5WjBIMQswCQYDVQQG # EwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNVBAMTF0RpZ2lDZXJ0 # IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # o1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xiFVjBqZMRp82qsmrd # ECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PWKyAcwZeUtKVQgfLP # ywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+cV7EBpo88MUueQ8b # ZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfXeCk5a+B4WZfjRCtK # 1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1HbybHLK3X9/w7nZ9 # MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5kGQc3AZEPHLVRzapM # ZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9NpHnxkTZ0P387RXoyq # q1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVpdceDZNZ1zY8Sdlal # JPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64b5bV4RAT/mFHCoz+ # 8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj7ArxES5k4MsiK8rx # KBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEAAaOCAYswggGHMA4G # A1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwHATAfBgNVHSMEGDAW # gBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbvE+fvzdBkodVWqWUx # o97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMuZGlnaWNlcnQuY29t # L0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NBLmNy # bDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRp # Z2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2VydHMuZGlnaWNlcnQu # Y29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NB # LmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCNT4o8aJzYJf/LLOTN # 6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3tPUiOuGu6fF29wmE3 # aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZXeY/bJlYrsPOnvTcM # 2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml101DkRBK+IA2eqUTQ # +OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdPM43UjXd9dUWhpVgm # agNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfvTVLzyWAhxFZH7doR # S4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qoNtS5cpZ+l3k4SF/K # wtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsHXjlY9HxzMVWggBHL # FAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaGa7oX/cR3bBVsrquv # czroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxguyj/OOVSWtasFyIj # TvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+WssBkbvQR7w8F/g29mt # kIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/ShmKl5bMA0GCSqGSIb3 # DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAX # BgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0 # ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIyMzU5NTlaMGMxCzAJ # BgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGln # aUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0Ew # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUGSbPBPXJJUVXHJQPE # 8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOciQt/nR+eDzMfUBML # JnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkrPkLcZ47qUT3w1lbU # 5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rwN3mfXazL6IRktFLy # dkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSmxR3NNg1c1eYbqMFk # dECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu9Yemj052FVUmcJgm # f6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirHkr+g3uM+onP65x9a # bJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506o9UD4L/wojzKQtwY # SH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklNiyDSLFc1eSuo80Vg # vCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGTyYwMO1uKIqjBJgj5 # FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgADoRU7s7pXcheMBK9 # Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0TAQH/BAgwBgEB/wIB # ADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYDVR0jBBgwFoAU7Nfj # gtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsG # AQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYYaHR0cDovL29jc3Au # ZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2FjZXJ0cy5kaWdpY2Vy # dC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNVHR8EPDA6MDigNqA0 # hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0 # LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwDQYJKoZIhvcN # AQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPPMFPOvxj7x1Bd4ksp # +3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKWb8RQTGIdDAiCqBa9 # qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpPkWaeLJ7giqzl/Yy8 # ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXazPByoyP6wCeCRK6Z # JxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKvxMfBwWpx2cYTgAnE # tp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl63f8lY5knLD0/a6fx # ZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YBT70/O3itTK37xJV7 # 7QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4nLCbbbxV7HhmLNriT # 1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvtlUG3OtUVmDG0YgkP # Cr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm2fBldkKmKYcJRyvm # fxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqhK/bt1nz8MIIFjTCC # BHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0BAQwFADBlMQswCQYD # VQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGln # aWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0Ew # HhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQswCQYDVQQGEwJVUzEV # MBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29t # MSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqGSIb3 # DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3yithZ # wuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1Ifxp4V # pX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDVySAd # YyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiODCu3 # T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQjdjU # N6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/CNda # SaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCiEhtm # mnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADMfRyV # w4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QYuKZ3 # AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXKchYi # Cd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t9dmp # sh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU7Nfj # gtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SSy4IxLVGLp6chnfNt # yA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYY # aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2Fj # ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3J0MEUG # A1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2Vy # dEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRVHSAAMA0GCSqGSIb3 # DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyhhyzshV6pGrsi+Ica # aVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO0Cre+i1Wz/n096ww # epqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo8L8vC6bp8jQ87PcD # x4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++hUD38dglohJ9vytsg # jTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5xaiNrIv8SuFQtJ37Y # OtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3ICAQEwdzBjMQswCQYD # VQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lD # ZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBAhAF # RK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoGCSqGSIb3DQEJAzEN # BgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIwMDk1NjM4WjArBgsq # hkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZPGZzPQDAvBgkqhkiG # 9w0BCQQxIgQgZt8I6422OjBF3Oe2n7X+oR0+4i5jijRhBm+me1yoSuUwNwYLKoZI # hvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK2lWarjMWr00amtQM # eCgwDQYJKoZIhvcNAQEBBQAEggIAFhZDw4qMwV2oSAC+kS+DXNhnMTiDoeQ+/x8C # v8f6BQ1HjWk/BAeeCDj/ZCgiC+3z+QgSdm2/Q0mp6M0beLdgplOzLFE3BrcWGHSs # iEiRkIeTgYZt1048D5Zp7mpGmPJJayi/fTtcuv+mhyJF+3Loug/GZgMGWQdFDTM1 # Zf/Rg8ZdxneqAWbh9P+7KcUi+QWxzQss5wWHeGsOb3r3ayCVlC6iRqE2pXAOyEkb # D60qnwQ7nOKjikfs6IrLTHFh6KWKpKzD6yvAKEekEiJRRZPpvIsndLZ2sjt//Fy8 # mo73CXdKs3jty6iJgnwRrStxItss+03xX4JApM04Nzv70CSqTW9b4dZQRB42kP4Y # 8Q0lliGGKzmDBr+neaDWEwYIBOYfP0i3hGaTvlqozLfNgKns7ZRmLXnWHgcdLKWo # QXiLf9Lvk1H51l95d9HL2pYS1BoDeKeGt67yajOdp1AwJqPbfs6QOxkSRYbhVHuF # zLGPnLdLwWgjL9npI92hNIQfP6luvfPC9We0XWl0DhnNzTGs5ketXF9/E4Nhj1Qf # xq+Uezd7JznsCH4k7IUemAnVtT0FBYs8DcbzCZwFlzC5WmBnud/LiV+WD/O8YGI4 # IDepEkd/SMDe8WcbmV1od+L564mKxbqYE7TxK+git8OfmaBcB7GO27xRcCsBl5Y8 # IdIE+bU= # SIG # End signature block
combined_dataset/train/non-malicious/sample_38_4.ps1
sample_38_4.ps1
# # Module manifest for module 'PSGet_AzStackHci.EnvironmentChecker' # # Generated by: Microsoft Corporation # # Generated on: 19/01/2022 # @{ # Script module or binary module file associated with this manifest. RootModule = '' # Version number of this module. ModuleVersion = '1.2100.2531.331' # Supported PSEditions # CompatiblePSEditions = '' # ID used to uniquely identify this module GUID = 'c1719136-a98f-4092-8db7-9f92b15dbef2' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) 2022 Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft AzStackHci Readiness Checker' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @( 'AzStackHci.MOCStack.psm1' 'AzStackHci.MOCStack.Helpers.psm1' ) # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @('Invoke-AzStackHciMOCStackValidation' ) # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Microsoft','AzStackHci' # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDMAzAvDF3++n05 # F66rns5ldpkR9RGSSH2diM9XMjGyAaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOdw2L9UTLr01utVm7G9FdPt # jBzsgf3BCOa98K6d43biMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAtGC1n/pqXzs1ZmIyWcCON0K+837oAuEU6SUJo5qwR9m1bcUFx+WqcGB4 # eMafouI0xWx+nvNDVHpr0UzLHsVyp4zQEGuIdiFwUNK+M1dX2aF8fd7CIHJ0Iu25 # 3MKRri063MkvENB11xAuIsD3Xc95Jw7MIdXqu/X8vkDcJvUOdyO7ZKBi5n4xnoyC # HUMsNJPxK/G1huXW73Qi5m7a/XUSLGAnhAhkkAWmvpHgqGBw3CijYpRSktrbeBjk # AX1pGLTCfxo3GpPlyf4/mJ8kQTuKknHiMA/ohJNFJ+BoEG8BC1d7xib0+iV4LvxL # vYM8nihDT1R96u8ukyVSatZh5Pvuh6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAWk08o+81p3QsKlruIqK3qEW4hikh/h88Me1YlqmJlZAIGZbwSmWnK # GBMyMDI0MDIxMjE0MDYzMi41NDdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRomjAiGA8yMDI0MDIxMjA5NTEy # MloYDzIwMjQwMjEzMDk1MTIyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGia # AgEAMAoCAQACAhA5AgH/MAcCAQACAhP8MAoCBQDpdboaAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBADQeYBN/t7KLX5/X88WTUfxjS80bxBfilJfF3AIjcI/2 # UQJXIfqFIvEqMd1jHT32G0+4Uuuo+b8jW+39m8VA6VJBIQrSlg9x3sH+Kt931BSw # 8yGtj1H6enwRjiR4ebfz+b62vA8RlyHp1PPyrI3x1QYIsocJLxC6Yly83/4mXMJI # MIjLouTLlSj6puEmDZD94kB6S91uzyJwjtLWGvHiiaX2FTVVYMguGaWbcfJ3d0O4 # uF0aXbJ+kNqY3bVpGzoIFtcnoKcPaBBAw7HmuVi1b4qIxYYSKvGPDKIA9WKQxRL/ # wQJQqTcjWrf9oDFPbLLcu972Lw5g+ML43RqPjdhCjz0xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB # 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBF/KI3tkz2SwNyY0L112JSu5rip5xCjRiml/hb/Rs6 # RzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+ # RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQgiLrL13zZQgm581jPxPYeOTTO # j+MDbj3O5P8XwVvjtHMwDQYJKoZIhvcNAQELBQAEggIAZBYPFriLrHhz93qrghA3 # pl8gL5c8gsOUvWnVxtTEvhg9i0wBVaFZN1UrHcnfbGM6wRTLV0Q89eycbHvhSODx # 0VdUqee4dxfNlMC3Umb6Y+IlcX8/uIt/zujO4O+nmZJSXmqKpeIAbfNDcEJasLlz # gnlFd4y9RkGdlwUkwVZD/Z5RLuH9K13rWhcWoO8K5NoKZLvE4whj7zJudT4d5BaP # jpXiokCFWSIYdLfV6ExCc+ZSUbwThkUIdeviuZVbtwwRAz35EpTuE1zxU92a4wut # uhJmpOFUlsA+QPS5Lk6CPIe+gkvcICighLmEBt+O3qGauhEfA6xWVw2yhI5kPPQg # Bv7tjZ0k4cq11RAVUYy/gACmtbTyIZJyvWLqxW/bgE/+cffP6G6IyjiTd5UhXK7n # V+7ArgVulIh7Hj80i3tEwhO45DiT853Ue0Ybu3XxMGclSYFGZk1pVBnJf3WKim2q # 3AxuAeu3rpbhRWD8Ge9cQ2VRuoeNn1VYXHCDsOYh3srVRWGX1b0liKH8rMe2G2og # JtfHWtY8v5CRSO2OJZ4snmBTETww/1b6huvOjdcCyNH5uzWL/Hguq3Wg80NzmTPO # brXN38YAHY51tVM3rHnvTuC2SH4CReJDAooMUgwkqya0E0ttu2UyEYFawd+PjiZk # QQTLpCMWQa2SiHizGHgCSyc= # SIG # End signature block
combined_dataset/train/non-malicious/sample_52_85.ps1
sample_52_85.ps1
# # Module manifest for module 'Az.MachineLearning' # # Generated by: Microsoft Corporation # # Generated on: 5/16/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'Az.MachineLearning.psm1' # Version number of this module. ModuleVersion = '1.1.4' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = '287cb4af-0379-4154-86bf-63c34f734bd3' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft Azure PowerShell - Machine Learning Web Services cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core. For more information on Machine Learning, please visit the following: https://learn.microsoft.com/azure/machine-learning/' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. DotNetFrameworkVersion = '4.7.2' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'Microsoft.Azure.Management.MachineLearning.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @() # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-AzMlWebServiceRegionalProperty', 'Export-AzMlWebService', 'Get-AzMlCommitmentAssociation', 'Get-AzMlCommitmentPlan', 'Get-AzMlCommitmentPlanUsageHistory', 'Get-AzMlWebService', 'Get-AzMlWebServiceKey', 'Import-AzMlWebService', 'Move-AzMlCommitmentAssociation', 'New-AzMlCommitmentPlan', 'New-AzMlWebService', 'Remove-AzMlCommitmentPlan', 'Remove-AzMlWebService', 'Update-AzMlCommitmentPlan', 'Update-AzMlWebService' # Variables to export from this module # VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = 'Get-AzMlWebServiceKeys' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Azure','ResourceManager','ARM','MachineLearning','MachineLearningCompute' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' # A URL to the main website for this project. ProjectUri = 'https://github.com/Azure/azure-powershell' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = '* Removed the outdated deps.json file.' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD5JXOLYoqhP7tm # d+stQ4rkqyYXRvMvmiWGNOHne7lrmqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIzptOOcHH7QKjn0tytzZmTd # +xz7vjxvWPM1GBrQguloMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEADQaOGYHSVfHTFbDRObuanqwlPO5HSisukkuSF1NH57k2aeWhRtQ++KEi # vTOGNzUw0wXZLHFBw4nRmJcGiWk+BYuPJG6yRrQJVlDfBDvwAW8sCEf7wxDpKaN1 # xtAXU5j/hMkbDswRgk59ZB7FgpT2yrL0qdo9LAivmW9NYWY/8M7+U1WrDwDk8seX # ZsNi7HxXFQ1Q92T7TL5Nb9G9xx9oo7CTpOHnxHpVyYN0ZAgpckHuKxcrhngTjdDW # dncVzzeDXj3WkG/hQscGc8W/5rJdfIAZy6Dyj4jaHx4ZLF2rzc0BlaGiHZxcBOz6 # aD/HxaGb4vcAUELiOi0gc0pAXRPA36GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDaIGIijlP1g7uvmi8zMkObonZZMharkzRD1MX0LA3MuAIGZjOTMUia # GBMyMDI0MDUxNjA3MjMzNC4zNjVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6 # G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q # 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G # HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR # mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX # STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai # PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug # 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc # EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j # cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4 # nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH # fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H # oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c # 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W # bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT # 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl # Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I # glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD # VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S # 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK # ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8 # MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe # 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ # 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/dJTAiGA8yMDI0MDUxNjAxMTcy # NVoYDzIwMjQwNTE3MDExNzI1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp790l # AgEAMAoCAQACAiY8AgH/MAcCAQACAhN/MAoCBQDp8S6lAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAEhVGnVlLQhp31Br8gQI4FrzQ3vgx9Hz7GvwwXnR7GaG # Ut443VjhqROBrxMxQAcaG7FEj9Ec75+06i7qsIn29zx09CxxDDhDGN2gDPFciLsE # BiuURZx2G5F9uUGFDLtMdH7wD0O9iNBOy4u6pEX8Ip1IkkkmbgAGeDW66AJ2vhiv # tKEdEy5eaL8estsNjCQ3L6A3hKgxoH2kApXhBX/zLQPT6H3lzouSfxjm3v3SXXHf # iXrIxLwskfDd6kHcAiEHUrdKpYIpKCrcG9rtprvYW65JqkZaE/mtxtCTO1jsw2op # 4gX0JsxTp0cnXjpgIHfNXUkclqhWpMH25ciLVUZGQFcxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB # 6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBKCoSjHVpOcSY8scJ520c9rFFw4nX3KtXDrY1dJu4n # XjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh # 5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgIbP0ZWY+r31SEk/v7RUAyrZJ # M1k6l1N9wsbSPOKyaUMwDQYJKoZIhvcNAQELBQAEggIAop1MIrCVzSIOnAyhikSR # 5oXYnefsLuqXRLePBNSfrxSSI891jpuWmZjdd1kuqrrAc/pvq9vJEexGrkN/RkAA # ciD2vMjE7Zbp4HaUvWimW7wQj2fJTF8o0iA5RVv+2Eufv4TPHd1iLr7o6dmviJw6 # KuYA4PBY39N0eHP20lNJgasaWndZztK8T0ThVzEjbD8v12UIS+vW+HABcSkGjuBL # OVJj6JJCElV7M7goOQe7z9wT7wey+XKbpzu/0OimYFkdRMMHZq9zrYBhNEhlU8iz # ugZAvFzTPezWPgqLMo71CxQaLfRc1aEt7rrBJ7S7FEv5GdgHFfFhGAWyeAHXtsYs # EYrrE6TMAKjBEN4MKENVs0K0GK3aYGOHqTq0flo9lZ1aYNTUf6TZgJv3vVGI15K2 # lZbJPTQ99rok3Gyg/qtLMvZMFYQL/Dk3k9wjtzvrdeKXEWxbYZpIjHSwKaA1cTzC # ETl9SCZodY87Act4okD1OU0y0QFTtL1bConhbHp6lBMZrIyizb8VVzhMrukcTD7P # OTRZP7iiMN9CYcPr9JCwoyCfRAqkue716o/QHqVd0AhEXF2XWrrzIyrMAecnnwNt # s9geN8IThXCUisok62P4Z4MzjFYInZmtU1pJn7Hlnw4vwbEDGFb8BRkBjKme2IO2 # FuY1e15Y3hzCtA1gvPIL1Jk= # SIG # End signature block
combined_dataset/train/non-malicious/225.ps1
225.ps1
function Get-ScriptAlias { [CmdletBinding()] PARAM ( [Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName)] [ValidateScript({ Test-Path -Path $_ })] [Alias("FullName")] [System.String[]]$Path ) PROCESS { FOREACH ($File in $Path) { TRY { $ScriptContent = (Get-Content $File -Delimiter $([char]0)) $AbstractSyntaxTree = [System.Management.Automation.Language.Parser]:: ParseInput($ScriptContent, [ref]$null, [ref]$null) $AbstractSyntaxTree.FindAll({ $args[0] -is [System.Management.Automation.Language.CommandAst] }, $true) | ForEach-Object -Process { $Command = $_.CommandElements[0] if ($Alias = Get-Alias | Where-Object { $_.Name -eq $Command }) { [PSCustomObject]@{ File = $File Alias = $Alias.Name Definition = $Alias.Definition StartLineNumber = $Command.Extent.StartLineNumber EndLineNumber = $Command.Extent.EndLineNumber StartColumnNumber = $Command.Extent.StartColumnNumber EndColumnNumber = $Command.Extent.EndColumnNumber StartOffset = $Command.Extent.StartOffset EndOffset = $Command.Extent.EndOffset } } } } CATCH { Write-Error -Message $($Error[0].Exception.Message) } } } }
combined_dataset/train/non-malicious/Get-LocalGroups_1.ps1
Get-LocalGroups_1.ps1
function Add-NoteProperty { <# .Synopsis Adds a NoteProperty member to an object. .Description This function makes adding a property a lot easier than Add-Member, assuming you want to add a NoteProperty, which I find is true about 90% of the time. .Parameter object The object to add the property to. .Parameter name The name of the new property. .Parameter value The object to add as the property. .Example # Create a new custom object and add some properties. PS> $custom_obj = New-Object PSObject PS> Add-NoteProperty $custom_obj Name 'Custom' PS> Add-NoteProperty $custom_obj Value 42 .Example # Add a NoteProperty by passing the object to be modified down the pipeline. PS> $bunch_of_objects | Add-NoteProperty -name 'meaning_of_life' -value 42 .Notes NAME: Add-NoteProperty AUTHOR: Tim Johnson <tojo2000@tojo200.com> FILE: LocalGroups.psm1 #> param([Parameter(Mandatory = $true, ValueFromPipeline = $true, Position = 0)] $object, [Parameter(Mandatory = $true, Position = 1)] [string]$name, [Parameter(Mandatory = $true, Position = 2)] $value) BEGIN{} PROCESS{ $object | Add-Member -MemberType NoteProperty ` -Name $name ` -Value $value } END{} } function Get-COMProperty{ <# .Synopsis Gets a property of a __ComObject object. .Description This function calls the InvokeMember static method of the class to get properties that aren't directly exposed to PowerShell, such as local group members found by calling Members() on a DirectoryServices group object. .Parameter com_object The object to retrieve the property from. .Parameter property_name The name of the property. .Example # Get the names of all members of a group. PS> [adsi]$computer = 'WinNT://servername' PS> $groups = $groups = $computer.psbase.children | >> ?{$_.psbase.schemaclassname -eq 'group'} PS> $groups[0].Members() | %{Get-COMProperty $_ 'Name'} .Notes NAME: Get-COMProperty AUTHOR: Tim Johnson <tojo2000@tojo200.com> FILE: LocalGroups.psm1 #> param([Parameter(Mandatory = $true, Position = 0)] $com_object, [Parameter(Mandatory = $true, Position = 1)] [string]$property_name) [string]$property = $com_object.GetType().InvokeMember($property_name, 'GetProperty', $null, $com_object, $null) Write-Output $property } function Get-LocalGroups{ <# .Synopsis Gets a list of objects with information about local groups and their members. .Description This function returns a list of custom PSObjects that are a list of local groups on a computer. Each object has a property called Members that is a list of PSObjects representing each member, with Name, Domain, and ADSPath. .Parameter computername The object to retrieve the property from. .Example # Get a list of groups from a server. PS> Get-LocalGroups servername .Notes NAME: Get-LocalGroups AUTHOR: Tim Johnson <tojo2000@tojo200.com> FILE: LocalGroups.psm1 #> param([Parameter(Mandatory = $true, ValueFromPipeline = $true)] [string]$computername = $env:computername) BEGIN{} PROCESS{ $output = @() [adsi]$computer = "WinNT://$computername" $groups = $computer.psbase.children | ?{$_.psbase.schemaclassname -eq 'group'} foreach ($group in $groups) { $members = @() $grp_obj = New-Object PSObject Add-NoteProperty $grp_obj 'Name' $group.Name.ToString() Add-NoteProperty $grp_obj 'aDSPath' $group.aDSPath.ToString() foreach ($user in $group.Members()){ $usr_obj = New-Object PSObject Add-NoteProperty $usr_obj 'aDSPath' (Get-COMProperty $user 'aDSPath') Add-NoteProperty $usr_obj 'Name' (Get-COMProperty $user 'Name') $path = $usr_obj.aDSPath.split('/') if ($path.Count -eq 4){ Add-NoteProperty $usr_obj 'Domain' $path[2] }elseif ($path.Count -eq 5) { Add-NoteProperty $usr_obj 'Domain' $path[3] }else{ Add-NoteProperty $usr_obj 'Domain' 'Unknown' } $members += $usr_obj } $members = @($members | Sort-Object -Property Domain, Name) Add-NoteProperty $grp_obj 'Members' $members Write-Output $grp_obj } } END{} }
combined_dataset/train/non-malicious/Harley.ps1
Harley.ps1
### # Description: Add Voice to Powershell # Version: 1.1 (11 Nov 2008) # Mike Hays / www.mike-hays.net / blog.mike-hays.net # Virtualization, Powershell, and more... ### # This is the actual speaking part. I cheat by adding spaces # (This makes the word sound right). $spokenText = "Super ca li fragilistic expi alidocious" # Create an object that represents the COM SAPI.SpVoice $voice = New-Object -com SAPI.SpVoice # Get the list of available voices $voiceList = $voice.GetVoices() # This script prefers using LH Michelle as a stand-in for Mary Poppins, # but I can't be sure that she exists on all computers, so I check for that. # She comes with some installations of Microsoft Word 2003. $voiceDescList = @() for ($i=0; $i -lt $voiceList.Count; $i++) { $voiceDescList += $voiceList.Item($i).GetDescription() } if ($voiceDescList -contains "LH Michelle") { $voiceMember = "Name=LH Michelle" } else { # This is the default voice if LH Michelle doesn't exist. # This will probably be Microsoft Sam $voiceMember = "Name=" + $voiceDescList[0] } $voiceToUse = $voice.GetVoices($voiceMember) # This sets the voice property on the COM object $voice.Voice = $voiceToUse.Item(0) # This actually does the speaking. [void] $voice.Speak($spokenText) # She's no Julie Andrews, but she'll say what you want. # END
combined_dataset/train/non-malicious/783e4a84-4d47-4c57-a257-2298ce2b32ff.ps1
783e4a84-4d47-4c57-a257-2298ce2b32ff.ps1
Function Get-DiskUsage { <# .SYNOPSIS A tribute to the excellent Unix command DU. .DESCRIPTION This command will output the full path and the size of any object and it's subobjects. Using just the Get-DiskUsage command without any parameters will result in an output of the directory you are currently placed in and it's subfolders. .PARAMETER Path If desired a path can be specified with the Path parameter. In no path is specified $PWD will be used. .PARAMETER h the -h paramater is the same as -h in Unix. It will list the folders and subfolders in the most appropriate unit depending on the size (i.e. Human Readable). .PARAMETER l The -l paramater will add the largest file to the end of the output. .PARAMETER Sort Allows you to sort by Folder or Size. If none i specified the default of Folder will be used. .PARAMETER Depth Depth will allow you to specify a maximum recursion depth. A depth of 1 would return the immediate subfolders under the root. .PARAMETER Force Works the same way as Get-ChildItem -force. .PARAMETER Descending Works the same way as Sort-Object -descending. .LINK http://www.donthaveasite.nu .NOTES Author: Jonas Hallqvist Developed with Powershell v3 #> [CmdletBinding( SupportsShouldProcess=$True )] param ( [String]$Path=$PWD, [Switch]$h, [Switch]$l, [String]$Sort="Folder", [Int]$Depth, [Switch]$Force, [Switch]$Descending ) $ErrorActionPreference = "silentlycontinue" function HumanReadable { param ($size) switch ($size) { {$_ -ge 1PB}{"{0:#'P'}" -f ($size / 1PB); break} {$_ -ge 1TB}{"{0:#'T'}" -f ($size / 1TB); break} {$_ -ge 1GB}{"{0:#'G'}" -f ($size / 1GB); break} {$_ -ge 1MB}{"{0:#'M'}" -f ($size / 1MB); break} {$_ -ge 1KB}{"{0:#'K'}" -f ($size / 1KB); break} #{$_ -eq $null}{"0B"} default {"{0}" -f ($size) + "B"} } } function LargestFolder { if ($h) { $large = ($results | Sort-Object -Property Size -Descending)[0] | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize -HideTableHeaders Write-host "Largest Folder is:" -NoNewline $large } else { $large = ($results | Sort-Object -Property Size -Descending)[0] | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize -HideTableHeaders Write-host "Largest Folder is:" -NoNewline $large } } function Max-Depth { param( [String]$Path = '.', [String]$Filter = '*', [Int]$Level = 0, [Switch]$Force, [Switch]$Descending, [int]$i=0 ) $results=@() $root = (Resolve-Path $Path).Path if ($root -notmatch '\\\\$') {$root += '\\'} if (Test-Path $root -PathType Container) { do { [String[]]$_path += $root + "$Filter" $Filter = '*\\' + $Filter $i++ } until ($i -eq $Level) $dirs=Get-ChildItem -directory $_path -Force:$Force foreach ($dir in $dirs) { $size = 0 $size += (gci $dir.Fullname -recurse | Measure-Object -Property Length -Sum).Sum $results += New-Object psobject -Property @{Folder=$dir.fullname;Size=$size} } if ($h) { $results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize } if ($l) { LargestFolder } if (($h -eq $false) -and ($l -eq $false)) { $results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize } } } if ($Depth) { Max-Depth -Path $Path -Level $Depth -Force:$Force -Descending:$Descending } else { $results = @() $dirs=Get-ChildItem -directory $Path -Force:$Force -Recurse foreach ($dir in $dirs) { $size = 0 $size += (gci $dir.FullName -Recurse | Measure-Object -Property Length -Sum).Sum $results+= New-Object psobject -Property @{Folder=$dir.FullName;Size=$size} } if ($h) { $results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize } if ($l) { LargestFolder } if (($h -eq $false) -and ($l -eq $false)) { $results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize } } }
combined_dataset/train/non-malicious/List DHCP Clients .ps1
List DHCP Clients .ps1
$DHCP_EnumSubnetClients = @' [DllImport("dhcpsapi.dll", SetLastError = true, CharSet = CharSet.Auto)] public static extern uint DhcpEnumSubnetClients( string ServerIpAddress, uint SubnetAddress, ref uint ResumeHandle, uint PreferredMaximum, out IntPtr ClientInfo, ref uint ElementsRead, ref uint ElementsTotal); '@ $DHCP_Structs = @' namespace mystruct { using System; using System.Runtime.InteropServices; public struct CUSTOM_CLIENT_INFO { public string ClientName; public string IpAddress; public string MacAddress; } [StructLayout(LayoutKind.Sequential)] public struct DHCP_CLIENT_INFO_ARRAY { public uint NumElements; public IntPtr Clients; } [StructLayout(LayoutKind.Sequential)] public struct DHCP_CLIENT_UID { public uint DataLength; public IntPtr Data; } [StructLayout(LayoutKind.Sequential)] public struct DATE_TIME { public uint dwLowDateTime; public uint dwHighDateTime; public DateTime Convert() { if (dwHighDateTime== 0 && dwLowDateTime == 0) { return DateTime.MinValue; } if (dwHighDateTime == int.MaxValue && dwLowDateTime == UInt32.MaxValue) { return DateTime.MaxValue; } return DateTime.FromFileTime((((long) dwHighDateTime) << 32) | (UInt32) dwLowDateTime); } } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)] public struct DHCP_HOST_INFO { public uint IpAddress; public string NetBiosName; public string HostName; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)] public struct DHCP_CLIENT_INFO { public uint ClientIpAddress; public uint SubnetMask; public DHCP_CLIENT_UID ClientHardwareAddress; [MarshalAs(UnmanagedType.LPWStr)] public string ClientName; [MarshalAs(UnmanagedType.LPWStr)] public string ClientComment; public DATE_TIME ClientLeaseExpires; public DHCP_HOST_INFO OwnerHost; } } '@ $resumeHandle = 0 $clientInfo = 0 $ElementsRead = 0 $ElementsTotal = 0 Add-Type $DHCP_Structs Add-Type -MemberDefinition $DHCP_EnumSubnetClients -Name GetDHCPInfo -Namespace Win32DHCP $DHCPServerIP = "192.168.1.100" # change this to match your DHCP server IP [void][Win32DHCP.GetDHCPInfo]::DhcpEnumSubnetClients($DHCPServerIP,0,[ref]$resumeHandle,0,[ref]$clientInfo,[ref]$ElementsRead,[ref]$ElementsTotal) $clients = [system.runtime.interopservices.marshal]::PtrToStructure($clientInfo,[mystruct.DHCP_CLIENT_INFO_ARRAY]) [int]$size = $clients.NumElements [int]$current = $clients.Clients $ptr_array = new-object system.intptr[]($size) $current = new-object system.intptr($current) for ($i=0;$i -lt $size;$i++) { $ptr_array[$i] = [system.runtime.interopservices.marshal]::ReadIntPtr($current) $current = $current + [system.runtime.interopservices.marshal]::SizeOf([system.IntPtr]) } function uIntToIP { param ($intIP) $objIP = new-object system.net.ipaddress($intIP) $arrIP = $objIP.IPAddressToString.split(".") return $arrIP[3] + "." + $arrIP[2] + "." + $arrIP[1] + "." + $arrIP[0] } [array]$clients_array = new-object mystruct.CUSTOM_CLIENT_INFO for ($i=0;$i -lt $size;$i++) { $objDHCPInfo = New-Object psobject $current_element = [system.runtime.interopservices.marshal]::PtrToStructure($ptr_array[$i],[mystruct.DHCP_CLIENT_INFO]) add-member -inputobject $objDHCPInfo -memberType noteproperty -name ClientIP -value $(uIntToIP $current_element.ClientIpAddress) add-member -inputobject $objDHCPInfo -memberType noteproperty -name ClientName -value $current_element.ClientName add-member -inputobject $objDHCPInfo -memberType noteproperty -name OwnerIP -value $(uIntToIP $current_element.Ownerhost.IpAddress) add-member -inputobject $objDHCPInfo -memberType noteproperty -name OwnerName -value $current_element.Ownerhost.NetBiosName add-member -inputobject $objDHCPInfo -memberType noteproperty -name SubnetMask -value $(uIntToIP $current_element.SubnetMask) add-member -inputobject $objDHCPInfo -memberType noteproperty -name LeaseExpires -value $current_element.ClientLeaseExpires.Convert() $mac = [System.String]::Format( "{0:x2}-{1:x2}-{2:x2}-{3:x2}-{4:x2}-{5:x2}", [system.runtime.interopservices.marshal]::ReadByte($current_element.ClientHardwareAddress.Data), [system.runtime.interopservices.marshal]::ReadByte($current_element.ClientHardwareAddress.Data, 1), [system.runtime.interopservices.marshal]::ReadByte($current_element.ClientHardwareAddress.Data, 2), [system.runtime.interopservices.marshal]::ReadByte($current_element.ClientHardwareAddress.Data, 3), [system.runtime.interopservices.marshal]::ReadByte($current_element.ClientHardwareAddress.Data, 4), [system.runtime.interopservices.marshal]::ReadByte($current_element.ClientHardwareAddress.Data, 5) ) add-member -inputobject $objDHCPInfo -memberType noteproperty -name MacAddress -value $mac $objDHCPInfo }
combined_dataset/train/non-malicious/198.ps1
198.ps1
function Get-SCSMWorkItemCreatedByUser { [CmdletBinding(DefaultParameterSetName = 'GUID')] param ( [Parameter(ParameterSetName = 'SMObject', Mandatory = $true, ValueFromPipeline = $true)] $SMObject, [Parameter(ParameterSetName = 'GUID', Mandatory = $true)] $Guid ) BEGIN { Import-Module -Name SMLets -ErrorAction Stop $RelationshipClass_CreatedByUser_Object = Get-SCSMRelationshipClass -Name System.WorkItemCreatedByUser } PROCESS { IF ($PSBoundParameters['GUID']) { foreach ($Item in $GUID) { $SMObject = Get-SCSMObject -id $item Write-Verbose -Message "[PROCESS] Working on $($Item.Name)" Get-ScsmRelatedObject -SMObject $SMObject -Relationship $RelationshipClass_CreatedByUser_Object | Select-Object -Property @{ Label = "WorkItemName"; Expression = { $SMObject.Name } }, @{ Label = "WorkItemGUID"; Expression = { $SMObject.get_id() } }, * } } IF ($PSBoundParameters['SMobject']) { foreach ($Item in $SMObject) { Write-Verbose -Message "[PROCESS] Working on $($Item.Name)" Get-ScsmRelatedObject -SMObject $Item -Relationship $RelationshipClass_CreatedByUser_Object | Select-Object -Property @{ Label = "WorkItemName"; Expression = { $Item.Name } }, @{ Label = "WorkItemGUID"; Expression = { $Item.get_id() } }, * } } } }
combined_dataset/train/non-malicious/sample_7_8.ps1
sample_7_8.ps1
$debug = $false $vmmskey = "HKLM:\SYSTEM\CurrentControlSet\Services\vmms" if (Test-Path $vmmskey) { Import-LocalizedData -BindingVariable HyperVNetStrings #Hyper-V Networking info Write-DiagProgress -Activity $HyperVNetStrings.ID_HyperVNet -Status $HyperVNetStrings.ID_HyperVNetObtaining $OutputFile = $Computername + "_Hyper-V-NetworkingInfo.txt" # detect OS version and SKU $wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem [int]$bn = [int]$wmiOSVersion.BuildNumber if ($bn -lt 9200) { $CommandToExecute = "cmd.exe /c cscript.exe //nologo nvspinfo.js /z > $OutputFile" } else { $CommandToExecute = "cmd.exe /c cscript.exe //nologo nvspinfov2.js /z > $OutputFile" } $FileDescription = "Hyper-V Networking Info" $sectionDescription = "Hyper-V Networking Advanced Information" RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $FileDescription -BackgroundExecution } # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAVaggZEGB9DOMx # qMi3kayglRSgD47UZmZpfBSHFLRM66CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGPYqJ8ET80BcOSgWOKbAoQ3 # kaGaiSQZSrixw1CL7wiVMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAkrhmOgsIaPoCS1f53m2yqPH/PlYcerUsE0PtSb5MP75GWgBVydLT+B3b # +s8QHgkaIN6q+GT/JSVE/Z4vZ4R0wi2wSHAwYL9+5hLOV5mlnWQNh6aedZRpAIo6 # RxrN5v0TrcUahTIFPR3sVSVvMyDeSveK+v2sV3UvoDIv3Nnakbas8WEPHu9BSExT # u3K9DY2evs8o3ZHg2JYvDdqMP24ZJGmwirotxXCmswoj0r2heNadtgkbbcLf6803 # zuIYVxZaHjYREVXovrRefjbG1F4RfjYriMSOmB9YyfoliYf5Efw+cB//LEUTW8J1 # E6Ee/RWxk5UNjus4gj15u3HgnwHpAqGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAB0KT9NcegBWZTrDYW9YLHAVhxHr6oRyUwEFQpUpZZpQIGZutC6/UA # GBMyMDI0MTAyODExNDA0NC42MzdaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/tCowns0IQsBAAEAAAH+MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExOFoXDTI1MTAyMjE4MzExOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjQwMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvLwhFxWlqA43olsE4PCe # gZ4mSfsH2YTSKEYv8Gn3362Bmaycdf5T3tQxpP3NWm62YHUieIQXw+0u4qlay4AN # 3IonI+47Npi9fo52xdAXMX0pGrc0eqW8RWN3bfzXPKv07O18i2HjDyLuywYyKA9F # mWbePjahf9Mwd8QgygkPtwDrVQGLyOkyM3VTiHKqhGu9BCGVRdHW9lmPMrrUlPWi # YV9LVCB5VYd+AEUtdfqAdqlzVxA53EgxSqhp6JbfEKnTdcfP6T8Mir0HrwTTtV2h # 2yDBtjXbQIaqycKOb633GfRkn216LODBg37P/xwhodXT81ZC2aHN7exEDmmbiWss # jGvFJkli2g6dt01eShOiGmhbonr0qXXcBeqNb6QoF8jX/uDVtY9pvL4j8aEWS49h # KUH0mzsCucIrwUS+x8MuT0uf7VXCFNFbiCUNRTofxJ3B454eGJhL0fwUTRbgyCbp # LgKMKDiCRub65DhaeDvUAAJT93KSCoeFCoklPavbgQyahGZDL/vWAVjX5b8Jzhly # 9gGCdK/qi6i+cxZ0S8x6B2yjPbZfdBVfH/NBp/1Ln7xbeOETAOn7OT9D3UGt0q+K # iWgY42HnLjyhl1bAu5HfgryAO3DCaIdV2tjvkJay2qOnF7Dgj8a60KQT9QgfJfwX # nr3ZKibYMjaUbCNIDnxz2ykCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRvznuJ9SU2 # g5l/5/b+5CBibbHF3TAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAiT4NUvO2lw+0 # dDMtsBuxmX2o3lVQqnQkuITAGIGCgI+sl7ZqZOTDd8LqxsH4GWCPTztc3tr8AgBv # sYIzWjFwioCjCQODq1oBMWNzEsKzckHxAzYo5Sze7OPkMA3DAxVq4SSR8y+TRC2G # cOd0JReZ1lPlhlPl9XI+z8OgtOPmQnLLiP9qzpTHwFze+sbqSn8cekduMZdLyHJk # 3Niw3AnglU/WTzGsQAdch9SVV4LHifUnmwTf0i07iKtTlNkq3bx1iyWg7N7jGZAB # RWT2mX+YAVHlK27t9n+WtYbn6cOJNX6LsH8xPVBRYAIRVkWsMyEAdoP9dqfaZzwX # GmjuVQ931NhzHjjG+Efw118DXjk3Vq3qUI1re34zMMTRzZZEw82FupF3viXNR3DV # OlS9JH4x5emfINa1uuSac6F4CeJCD1GakfS7D5ayNsaZ2e+sBUh62KVTlhEsQRHZ # RwCTxbix1Y4iJw+PDNLc0Hf19qX2XiX0u2SM9CWTTjsz9SvCjIKSxCZFCNv/zpKI # lsHx7hQNQHSMbKh0/wwn86uiIALEjazUszE0+X6rcObDfU4h/O/0vmbF3BMR+45r # AZMAETJsRDPxHJCo/5XGhWdg/LoJ5XWBrODL44YNrN7FRnHEAAr06sflqZ8eeV3F # uDKdP5h19WUnGWwO1H/ZjUzOoVGiV3gwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAhGNHD/a7Q0bQLWVG9JuGxgLRXseggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJ0ggwIhgPMjAyNDEwMjgwOTA0MDhaGA8yMDI0MTAyOTA5MDQwOFowdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6snSCAIBADAKAgEAAgIIsAIB/zAHAgEAAgIS # xjAKAgUA6ssjiAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAzScy1wBbp # cAxuJLYnsTb2C1R/1ZXPRTrV+7w4izx+oXOHAUu9aHGG0qSOBjk7VgyCvjFMirT1 # 1HILBBTHTiJcA1z5b5OIdys0RWWcnLCQGSKItm8KNNpeE+oE9viQRHMLsU/3b8hu # zWEHTDeOOyc8wNVIJCcPXDGQg42Yf1qMqoPpqyCmMTSjn3XQ0nllmNeGCeUkdIsN # TpwD4mbbVXPVq+KbVt/jatJZw3YrTnjzg1j5AdrolA/aN3CjM0gf25XwDETanz7K # LbHkfz5gxAN8qJTYbSOoyGTYr8cl5Rqrrp+0jwplK+S9FVUpwZNtKUwYSNiOSsA9 # S5bfDmOgcd8kMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAH+0KjCezQhCwEAAQAAAf4wDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgxevPxssS # HmJOr3Qiw55BmDSUFNm13eQhBT2/Y/E14k4wgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCARhczd/FPInxjR92m2hPWqc+vGOG1+/I0WtkCstyh0eTCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/tCowns0IQsBAAEA # AAH+MCIEIBHab5Kt80GYeIFqPjdXAVG0HIgzkQ3JSwH65KUaSnvoMA0GCSqGSIb3 # DQEBCwUABIICADRUg9fEQTdm0r9Vhi+nAH46yXhaUo4gj72VEczUNJ26sDjplel3 # pXH+j5p2Fbc9bABojmO1IWIEu4L/5PXQU+Vj7SVqWT4143XRVi9n0c8ymD5dpQDh # zIsP79EOdtY423FbhPKLhXXEoL+yRujLQHZk8JcxJllDk4Wzydfm2TnTfiDs5vCO # GkSCS5r0CDaXgZLtQhRmFJuIHcjn62NwL0SavC726t1UTQ0k4avfue+j2jYyPHBK # HH4UYyzy3lxulo8hTUnoC6XZKgsngevtMLCn5k9yN7vzdUoj0eWSkT6AN9qABG6h # CwnuRFNXkG2FGVhVL5LQOLDuNEMNjhVlcAuTGc6jAp1cx/RDnHz1TKANBOiy5LbB # EQpGO13jil9Dtw1AJCTlx52FLLZ1LVAqP0meiTrT7GX/1N2m70Tjp4pVmYnB8k5J # lGDgIlaR/TGVVHT3qUvTXa7nrAsmgbD8yVDfm5GHxwHW+QoOAfBRjk3IBrNET1iG # iL37CxSC940gLki6zGNxkt5G2cK8lUnoEE/pOv4Ikumcr7Epc8bPdT2WhNYfb5OY # oTDlSAr7pbrMJJceA+gfLeaoG0QmwVZP+W5YU8uyqVdu7LkeIJL4qybcV9MLCajd # hWB83s24uoN2Tbdcvz9ti1wshqynmawM9zF0YQkKrYQSOipAMMyKC28Z # SIG # End signature block
combined_dataset/train/non-malicious/count-object.ps1
count-object.ps1
#a function to count how many items there are, whether its an array, a collection, or actually just # a single no array/non list/non collection object in which case it would be 1 function count ($InputObject) { if ($inputobject -eq $Null ) { return 0} if ($inputobject -is [system.array]) { return $inputobject.length } if ($inputobject -is [system.collections.ICollection] -or $inputobject -is [system.collections.IList] ) { return $inputobject.count } #strings are ienumerable, they also have a length, but i think we want to treat 1 string as one object if ($inputobject -is [string]) { return 1 } #-1 to show that it is enumerable, but we can't know its length, it could be infinate, #or take a long time even to enumerate without going over if ($inputobject -is [system.collections.IEnumerable]) { return -1 } #otherwise just return 1 return 1 } count (get-process) count (1,2,3) count "hello" count 3 $a = new-object system.collections.arraylist [void] $a.add(4); [void] $a.add("yo"); count $a
combined_dataset/train/non-malicious/1221.ps1
1221.ps1
& (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) $shareName = 'CarbonGetFileShare' $sharePath = $null $shareDescription = 'Share for testing Carbon''s Get-FileShare function.' function Start-TestFixture { $sharePath = New-TempDirectory -Prefix $PSCommandPath Install-SmbShare -Path $sharePath -Name $shareName -Description $shareDescription } function Stop-TestFixture { $share = Get-WmiObject 'Win32_Share' -Filter "Name='$shareName'" if( $share -ne $null ) { [void] $share.Delete() } Remove-Item -Path $sharePath } function Test-ShouldGetPermissions { $shares = Get-FileShare Assert-NotNull $shares $carbonShare = $shares | Where-Object { $_.Name -eq $shareName } } function Test-ShouldGetSpecificShare { $carbonShare = Get-FileShare -Name $shareName Assert-CarbonShare $carbonShare } function Test-ShouldGetOnlyFileShares { $nonFileShares = Get-WmiObject -Class 'Win32_Share' | Where-Object { $_.Type -ne 0 -and $_.Type -ne 2147483648 } if( $nonFileShares ) { foreach( $nonFileShare in $nonFileShares ) { $share = Get-FileShare | Where-Object { $_.Name -eq $nonFileShare.Name } Assert-Null $share } } else { Write-Warning ('No non-file shares on this computer.') } } function Test-ShouldAcceptWildcards { $carbonShare = Get-FileShare 'CarbonGetFile*' Assert-CarbonShare $carbonShare } function Test-ShouldWriteErrorWhenShareNotFound { $share = Get-FileShare -Name 'fjdksdfjsdklfjsd' -ErrorAction SilentlyContinue Assert-Error -Last -Regex 'not found' Assert-Null $share } function Test-ShouldNotWriteErrorIfNoWildcardMatches { $carbonShare = Get-FileShare 'fjdskfsdf*' Assert-NoError Assert-Null $carbonShare } function Test-ShouldIgnoreErrors { Get-FileShare -Name 'fhsdfsdfhsdfsdaf' -ErrorAction Ignore Assert-NoError } function Assert-CarbonShare { param( $Share ) Assert-NotNull $Share Assert-Equal $shareDescription $Share.Description Assert-Equal $sharePath.FullName $Share.Path }
combined_dataset/train/non-malicious/1758.ps1
1758.ps1
"Hello from PowerShell!" python3 -c @" print(' Hello from Python!') print(' Python and PowerShell get along great!') "@ "Back to PowerShell." "Bye now!"
combined_dataset/train/non-malicious/sample_7_1.ps1
sample_7_1.ps1
BT /GS0 gs /TT0 1 Tf -0.0003 Tc 10.02 0 0 10.02 72 709.98 Tm (c.)Tj /TT1 1 Tf -0.0007 Tc 0.0011 Tw 1.796 0 Td [(If you are a )5.9(MPN )5.9(Member)]TJ /TT0 1 Tf 0 Tc 0 Tw 12.784 0 Td (:)Tj -0.001 Tc -12.784 -1.204 Td (i.)Tj -0.0003 Tc -0.0008 Tw 1.796 0 Td [(Each licen)6.4(se )6(acquired on b)7.5(e)-0.9(half of y)6.7(o)-2.2(urself may only )6(be used to review one \(1)6.7(\) )6(copy of the )]TJ 10.02 0 0 10.02 513.0258 697.9199 Tm (Microsoft)Tj -0.0006 Tc -0.0005 Tw 10.02 0 0 10.02 107.9999 685.8599 Tm (Instructor-Led Courseware in the form p)Tj 10.02 0 0 10.02 72 709.98 Tm 21.398 -2.407 Td [(r)0.5(ovided to y)6.4(o)]TJ -0.0005 Tc -0.0006 Tw 5.788 0 Td [(u. If the Micr)6.6(osoft Instructor-Led Courseware i)6.5(s)]TJ -0.0002 Tc -0.0009 Tw -23.593 -1.21 Td [(in digital form)7.3(at, y)6.8(o)-2.1(u may i)6.8(n)0.5(stall )6(one \(1\) copy on)]TJ 0.0001 Tc -0.0012 Tw 21.539 0 Td [( up to three \(3)7.1(\) P)6.5(erson)6.8(al Devic)6.4(es. Y)7.4(o)-1.8(u may )]TJ 10.02 0 0 10.02 520.5498 673.7397 Tm (not)Tj 0.0002 Tc 10.02 0 0 10.02 107.9999 661.6796 Tm (install th)Tj 10.02 0 0 10.02 72 709.98 Tm 7.342 -4.82 Td [(e Mic)6.5(r)1.3(os)3.4(oft Instru)6.9(c)6.5(t)-0.7(or-L)6.7(ed Cours)3.4(eware )6(on a d)8(evice you do )6(not o)4.2(wn or c)6.5(o)4.2(ntrol.)]TJ -0.001 Tc 0 Tw -5.545 -1.204 Td (ii.)Tj 0.0001 Tc -0.0012 Tw 1.796 0 Td [(For each lic)6.4(en)6.8(se you )6(acquir)7.2(e on behalf )6(of)7.1( an End )6(User )6(or Tr)7.2(ainer, y)7.1(o)4.1(u may either:)]TJ -0.001 Tc 0 Tw 0 -1.204 TD (1.)Tj -0.0005 Tc -0.0006 Tw 2.245 0 Td [(distribute one \(1\) hard cop)7.3(y)0.5( version )6(of the Micr)]TJ 0.0001 Tc -0.0012 Tw 20.832 0 Td [(osof)7.1(t Instructor-L)6.6(ed Courseware )6(to on)6.8(e \(1\) En)]TJ 10.02 0 0 10.02 543.8005 637.5594 Tm (d)Tj -0.0004 Tc -0.0007 Tw 10.02 0 0 10.02 130.4998 625.4994 Tm (User attendin)Tj 10.02 0 0 10.02 72 709.98 Tm 11.744 -8.431 Td [(g the Private )6(Training Session, )]TJ -0.0006 Tc -0.0005 Tw 13.735 0 Td [(and only i)6.4(mmediately p)7.2(r)0.5(ior to th)]TJ 10.02 0 0 10.02 468.8846 625.4994 Tm (e commencement)Tj 0 Tc -0.0011 Tw 10.02 0 0 10.02 130.4998 613.4393 Tm (of the Private)Tj 10.02 0 0 10.02 72 709.98 Tm 11.759 -9.635 Td [( Training Se)5.4(ssion th)6.7(at i)7(s)-2.8( th)6.7(e su)]TJ 0.0003 Tc -0.0014 Tw 13.595 0 Td [(bject m)7.8(a)-1.7(t)5.4(t)-0.6(er of the )6(Mic)6.6(r)1.4(os)3.5(oft Instru)7(c)6.6(t)-0.6(or-L)]TJ 10.02 0 0 10.02 507.0974 613.4393 Tm (ed)Tj -0.0004 Tc -0.0007 Tw 10.02 0 0 10.02 130.4998 601.3191 Tm (Courseware b)Tj 10.02 0 0 10.02 72 709.98 Tm 11.878 -10.844 Td [(e)-1(ing provided, )]TJ /TT1 1 Tf 0 Tw 6.601 0 Td (or)Tj /TT0 1 Tf -0.001 Tc -14.886 -1.204 Td (2.)Tj -0.0003 Tc -0.0008 Tw 2.245 0 Td [(provide one \(1\) End User )6(who is )6(attend)7.5(ing the Private Training S)5.9(e)5.1(ssi)6.7(on with th)]TJ 10.02 0 0 10.02 477.5653 589.259 Tm (e unique)Tj -0.0001 Tc -0.001 Tw 10.02 0 0 10.02 130.4998 577.199 Tm (redemption c)Tj 10.02 0 0 10.02 72 709.98 Tm 11.626 -13.252 Td [(o)-2(de and in)6.6(str)7(u)0.6(ction)6.6(s)-2.9( on h)6.6(o)3.9(w they can )6(ac)6.2(cess one )6(\(1\) )6(digital version)]TJ 10.02 0 0 10.02 486.1003 577.199 Tm ( of the)Tj 0.0002 Tc -0.0013 Tw 10.02 0 0 10.02 130.4998 565.1389 Tm (Micro)Tj 10.02 0 0 10.02 72 709.98 Tm 8.199 -14.455 Td [(s)-2.6(oft In)6.9(st)5.3(ructor-L)6.7(ed Co)4.2(ursew)5.9(a)-1.8(re)5.6(, )]TJ /TT1 1 Tf -0.0004 Tc 0 Tw 14.31 0 Td (or)Tj /TT0 1 Tf -0.001 Tc -18.916 -1.204 Td (3.)Tj 0 Tc -0.0011 Tw 2.245 0 Td [(you will provi)7(d)1.8(e one \(1\) )6(Tr)7.1(ainer wh)6.7(o is teaching the P)6.4(r)1.1(ivate Tr)7.1(ainin)6.7(g)1.8( Sessi)]TJ 10.02 0 0 10.02 456.7321 553.0788 Tm (on with the unique)Tj -0.0001 Tc 10.02 0 0 10.02 130.4998 541.0188 Tm (redemption c)Tj 10.02 0 0 10.02 72 709.98 Tm 11.626 -16.862 Td [(o)-2(de and in)6.6(str)7(u)0.6(ction)6.6(s)-2.9( on h)6.6(o)3.9(w they can )6(ac)6.2(cess one )6(\(1\) )6(Trainer C)7.7(o)]TJ 10.02 0 0 10.02 470.8132 541.0188 Tm (ntent,)Tj /TT1 1 Tf -0.0007 Tc 0.0011 Tw 10.02 0 0 10.02 107.9999 528.8986 Tm (provided you comply )Tj 10.02 0 0 10.02 72 709.98 Tm 14.306 -18.072 Td (with the following)Tj /TT0 1 Tf -0.0062 Tc 0 Tw 9.149 0 Td (: )Tj -0.001 Tc -21.659 -1.204 Td (iii.)Tj -0.0005 Tc -0.0006 Tw 1.796 0 Td [(you will only )6(provide access to the Licen)6.2(s)-3.3(ed Conten)7(t to those indivi)6.5(duals wh)]TJ 10.02 0 0 10.02 442.6882 516.8385 Tm (o have acquired a valid)Tj -0.0004 Tc 10.02 0 0 10.02 107.9999 504.7784 Tm (license t)Tj 10.02 0 0 10.02 72 709.98 Tm 7.206 -20.479 Td [(o)-2.3( the)5( Licensed Con)6.3(t)-1.3(ent, )]TJ -0.001 Tc 0 Tw -5.41 -1.204 Td (iv.)Tj -0.0002 Tc -0.0009 Tw 1.796 0 Td [(you will ensur)6.9(e)-0.8( that each )6(End User )6(atten)6.5(d)1.6(ing an Private Training S)6(e)5.2(ssi)6.8(on has thei)6.8(r own valid lic)]TJ 10.02 0 0 10.02 527.9326 492.7183 Tm (ensed)Tj 0.0002 Tc -0.0013 Tw 10.02 0 0 10.02 107.9999 480.6583 Tm (copy of the )Tj 10.02 0 0 10.02 72 709.98 Tm 8.858 -22.886 Td [(M)4.2(i)1.2(cros)3.4(oft Instr)7.3(u)0.9(ctor-L)6.7(ed Co)4.2(ursew)5.9(a)-1.8(re th)6.9(at)]TJ 0.0004 Tc -0.0015 Tw 18.112 0 Td [( is the )6(subjec)6.7(t of the Priv)7.4(at)5.5(e Training S)6.6(e)5.8(ssi)7.4(on, )]TJ -0.001 Tc 0 Tw -25.174 -1.204 Td (v.)Tj -0.0003 Tc -0.0008 Tw 1.796 0 Td [(you will ensur)6.8(e)-0.9( that each )6(End User pr)6.8(ovi)6.7(d)1.5(ed with a )]TJ -0.0007 Tw 22.766 0 Td [(hard copy versi)6.6(o)-2.3(n of the )6(Micr)]TJ 10.02 0 0 10.02 464.8425 468.5982 Tm (osoft Instructor-Led)Tj -0.0002 Tc -0.0009 Tw 10.02 0 0 10.02 107.9989 456.478 Tm (Courseware )Tj 10.02 0 0 10.02 72 709.98 Tm 9.084 -25.3 Td [(will be presen)6.5(ted with a c)6.1(o)3.8(py of this agr)6.9(eement )6(and each End )6(User)6.9( will agree th)6.5(at their )]TJ 0 Tc -0.0011 Tw -5.491 -1.204 Td [(use of )6(the Mi)7(crosoft Instru)6.7(ctor-L)6.5(ed Cour)7.1(seware will b)7.8(e)-0.6( subject )6(to the terms in this agreem)7.5(en)6.7(t prior to )]TJ -0.0004 Tc -0.0007 Tw T* [(providing them with the )6(Microsoft Instru)6.3(ctor-L)6.1(ed )4.4(Cour)6.7(seware. )6(Each)6.3( individual will be required to )]TJ -0.0005 Tc T* [(denote their )6(acceptance )6(of this agreement in a ma)]TJ -0.0002 Tc -0.0009 Tw 22.293 0 Td [(nn)6.5(er that i)6.8(s)-3( enf)6.8(o)-2.1(rceable und)7.6(er local law p)7.6(r)0.9(ior to )]TJ -0.0004 Tc -0.0007 Tw -22.293 -1.204 Td [(their acce)5(ssin)6.3(g the Microsoft Instructor-Led Course)5(w)5.3(a)-2.4(re, )6( )]TJ -0.001 Tc 0 Tw -1.796 -1.204 Td (vi.)Tj -0.0004 Tc -0.0007 Tw 1.796 0 Td [(you will ensur)6.7(e)-1( that each )6(Trainer teachin)6.3(g)1.4( an Pr)1.2(ivate )6(Training Session has their )6(own valid licen)]TJ 10.02 0 0 10.02 526.2281 396.1776 Tm (sed)Tj -0.0001 Tc -0.001 Tw 10.02 0 0 10.02 107.9989 384.0575 Tm (copy of the )Tj 10.02 0 0 10.02 72 709.98 Tm 8.855 -32.527 Td [(Trainer Cont)5(en)6.6(t that i)6.9(s)-2.9( the )6(subject of th)6.6(e Private )6(Traini)6.9(ng Session)6.6(,)3.2( )]TJ -0.001 Tc 0 Tw -7.059 -1.204 Td (vii.)Tj -0.0002 Tc -0.0009 Tw 1.796 0 Td [(you will only )6(use qualified )6(Trainer)6.9(s)-3( wh)6.5(o )6(hold the appl)]TJ -0.0003 Tc -0.0008 Tw 23.461 0 Td [(i)6.7(cable Micr)6.8(osoft Certificati)6.7(o)]TJ 10.02 0 0 10.02 461.4009 371.9974 Tm (n credential that is)Tj 0.0003 Tc -0.0014 Tw 10.02 0 0 10.02 107.9989 359.9373 Tm (the subje)Tj 10.02 0 0 10.02 72 709.98 Tm 7.684 -34.934 Td [(c)0.6(t of)7.3( the Micro)4.3(s)3.5(oft)5.4( Instruct)5.4(or-Le)5.7(d)2.1( Course)]TJ -0.0005 Tc -0.0006 Tw 17.914 0 Td [(ware being taught for all your P)5.9(r)0.6(ivate Tr)6.6(ainin)6.2(g)1.3( )]TJ 0.0008 Tc -0.0079 Tw -22.006 -1.204 Td [(Session)7.5(s)-2(, )]TJ -0.001 Tc 0 Tw -1.796 -1.204 Td (viii.)Tj -0.0005 Tc -0.0006 Tw 1.796 0 Td [(you will only )6(use qualified )6(MCTs wh)6.2(o hold the applicab)]TJ -0.0002 Tc -0.0009 Tw 24.036 0 Td [(le Microsoft )6(Certification c)6.1(r)0.9(edential th)]TJ 10.02 0 0 10.02 513.3766 335.8172 Tm (at is the)Tj 10.02 0 0 10.02 107.9989 323.697 Tm (subject )Tj 10.02 0 0 10.02 72 709.98 Tm 7.057 -38.551 Td [(of the MOC title bei)6.8(n)0.5(g taught for )6(all your Private Training S)6(e)5.2(ssi)6.8(ons u)6.5(s)-3(ing )6(MOC, )]TJ 0.0005 Tc 0 Tw -5.261 -1.204 Td (ix.)Tj -0.0004 Tc -0.0007 Tw 1.796 0 Td [(you will only )6(provide access to the Micr)6.7(osoft In)]TJ -0.0005 Tc 20.671 0 Td [(structor-Led Cour)6.6(seware to End )6(Users, and)]TJ 0.0019 Tc 0 Tw -22.467 -1.204 Td (x.)Tj -0.0001 Tc -0.001 Tw 1.796 0 Td [(you will only )6(provide access to the Tr)7(ain)6.6(e)-0.7(r Content )6(to Trainer)7(s)]TJ 10.02 0 0 10.02 382.7803 299.5768 Tm (.)Tj -0.0018 Tc 0 Tw 10.02 0 0 10.02 72 275.4567 Tm (d.)Tj /TT1 1 Tf -0.0013 Tc 0.0017 Tw 1.796 0 Td (If you are an End)Tj 10.02 0 0 10.02 176.1662 275.4567 Tm ( User:)Tj /TT0 1 Tf 0 Tc -0.0011 Tw 10.02 0 0 10.02 89.9999 263.3966 Tm (For each lic)Tj 10.02 0 0 10.02 72 709.98 Tm 6.827 -44.569 Td [(en)6.7(se you )6(acquir)7.1(e, you m)7.5(a)-2(y u)6.7(s)-2.8(e the )6(Micr)]TJ -0.0003 Tc -0.0008 Tw 17.55 0 Td [(osoft Instru)6.4(ctor)6.8(-Led Cour)6.8(seware solely for )]TJ 10.02 0 0 10.02 505.1557 263.3966 Tm (your)Tj 0.0001 Tc -0.0012 Tw 10.02 0 0 10.02 89.9999 251.2764 Tm (person)Tj 10.02 0 0 10.02 72 709.98 Tm 4.776 -45.779 Td [(al train)6.8(i)1.1(ng use. If th)6.8(e Microsof)7.1(t Instructor-L)]TJ 0 Tc -0.0011 Tw 19.391 0 Td [(ed Courseware i)7(s)-2.8( in digital for)7.1(m)1.5(at, y)7(o)-1.9(u may)7( access th)]TJ 10.02 0 0 10.02 550.6074 251.2764 Tm (e)Tj 10.02 0 0 10.02 89.9999 239.2164 Tm (Micro)Tj 10.02 0 0 10.02 72 709.98 Tm 4.156 -46.982 Td [(s)-2.8(oft In)6.7(st)5.1(ructor-L)6.5(ed Co)4(ursew)5.7(a)-2(re onli)7(ne using th)]TJ -0.0006 Tc -0.0005 Tw 20.502 0 Td [(e )6(unique redem)6.9(p)1.2(tion code pr)6.5(ovided to y)6.4(o)]TJ 10.02 0 0 10.02 501.1763 239.2164 Tm (u by the)Tj 0 Tc -0.0011 Tw 10.02 0 0 10.02 89.9999 227.1563 Tm (training provi)Tj 10.02 0 0 10.02 72 709.98 Tm 7.63 -48.186 Td [(d)1.8(er and inst)5.1(al)7(l and use )6(one)5.4( \(1\) copy of)]TJ 0.0003 Tc -0.0014 Tw 17.106 0 Td [( t)5.4(h)1(e Micro)4.3(s)-2.5(of)7.3(t Instruct)5.4(or-L)6.8(ed Course)5.7(ware )]TJ 10.02 0 0 10.02 504.3088 227.1563 Tm (on up to)Tj 0.0001 Tc -0.0012 Tw 10.02 0 0 10.02 89.9999 215.0962 Tm (three \(3\) Per)Tj 10.02 0 0 10.02 72 709.98 Tm 7.467 -49.39 Td [(s)3.3(onal Device)5.5(s)3.3(.)3.4( You may al)7.1(s)3.3(o)-1.8( print one \(1)7.1(\) copy of the )6(Micro)4.1(s)-2.7(oft In)6.8(st)5.2(ructor-L)6.6(ed Co)4.1(ursew)5.8(a)-1.9(re)]TJ 10.02 0 0 10.02 550.8379 215.0962 Tm (.)Tj 0.0002 Tc 10.02 0 0 10.02 89.9999 203.0361 Tm (You may n)Tj 10.02 0 0 10.02 72 709.98 Tm 6.513 -50.593 Td [(o)-1.7(t i)7.2(n)0.9(stall t)5.3(h)0.9(e Mic)6.5(r)1.3(os)3.4(oft Instru)6.9(c)6.5(t)-0.7(or-L)6.7(ed Cours)3.4(eware )6(on a d)8(evice you do )6(not o)4.2(wn or c)6.5(o)4.2(ntrol.)]TJ 0.0006 Tc 0 Tw -6.513 -2.413 Td (e.)Tj /TT1 1 Tf -0.0006 Tc 0.001 Tw 1.796 0 Td [(If you)4.8( are a )]TJ 10.02 0 0 10.02 150.9375 178.8559 Tm (Trainer.)Tj /TT0 1 Tf -0.001 Tc 0 Tw 10.02 0 0 10.02 89.9999 166.7958 Tm (i.)Tj -0.0001 Tc -0.001 Tw 2.246 0 Td (For each lic)Tj 10.02 0 0 10.02 95.34 166.8 Tm 6.742 0 Td [(en)6.6(se you )6(acquir)7(e, you m)7.4(a)-2.1(y in)6.6(stall )6(and )]TJ 0.0002 Tc -0.0013 Tw 16.964 0 Td [(use )6(one \(1\) c)6.5(o)-1.7(py )6(of the )6(Trainer)7.3( Content in th)]TJ 10.02 0 0 10.02 531.8298 166.8 Tm (e)Tj -0.0006 Tc -0.0005 Tw 10.02 0 0 10.02 112.5003 154.7399 Tm (form provided to you on one \(1\) Per)Tj 10.02 0 0 10.02 95.34 166.8 Tm 17.702 -1.204 Td [(s)-3.4(on)6.1(al Device solely to prepare )]TJ 10.02 0 0 10.02 408.035 154.7399 Tm (and deliver an Authorized)Tj -0.0004 Tc -0.0007 Tw 10.02 0 0 10.02 112.5003 142.6799 Tm (Training Session or Private )Tj 10.02 0 0 10.02 95.34 166.8 Tm 13.772 -2.407 Td (Training)Tj 0.0001 Tc -0.0012 Tw 3.588 0 Td [( Se)5.5(s)3.3(s)-2.7(ion, )6(and inst)5.2(al)7.1(l one \(1\) addi)7.1(tional c)6.4(o)-1.8(py o)4.1(n)0.8( anoth)6.8(er Per)7.2(s)-2.7(on)]TJ 10.02 0 0 10.02 546.0434 142.6799 Tm (al)Tj -0.0004 Tc -0.0007 Tw 10.02 0 0 10.02 112.5003 130.6198 Tm (Device as a b)Tj 10.02 0 0 10.02 95.34 166.8 Tm 7.604 -3.611 Td [(a)-2.4(ckup copy)6.6(, which may be used only )6.1(to )6(reinstall the )6(Trainer Conten)6.3(t. You m)7.1(a)-2.4(y n)6.3(o)]TJ 10.02 0 0 10.02 531.535 130.6198 Tm (t)Tj -0.0001 Tc -0.001 Tw 10.02 0 0 10.02 112.5003 118.5597 Tm (install )Tj 10.02 0 0 10.02 95.34 166.8 Tm 4.568 -4.814 Td [(or use )6(a copy of the )6(Trainer C)7.7(o)-2(ntent on )]TJ 0 Tc 17.774 0 Td [(a devic)6.3(e you do n)6.7(o)-1.9(t )6(own or c)6.3(o)-1.9(ntr)7.1(o)-1.9(l. You m)7.5(a)]TJ 10.02 0 0 10.02 513.014 118.5597 Tm (y also)Tj -0.0001 Tc 10.02 0 0 10.02 112.5003 106.4395 Tm (print one \(1\) )Tj 10.02 0 0 10.02 95.34 166.8 Tm 7.614 -6.024 Td [(copy of the )6(Trainer Conten)6.6(t solely )6(to)]TJ -0.0006 Tc -0.0005 Tw 16.123 0 Td [( prepare for and )6(deliver an Authorized Tr)]TJ 10.02 0 0 10.02 514.1778 106.4395 Tm (aining)Tj 0 Tc -0.0071 Tw 10.02 0 0 10.02 112.5003 94.3794 Tm (Session or )Tj 10.02 0 0 10.02 95.34 166.8 Tm 6.538 -7.228 Td [(Private Training Session)6.7(.)]TJ ET
combined_dataset/train/non-malicious/sample_35_41.ps1
sample_35_41.ps1
# # Module manifest for module 'OCI.PSModules.Disasterrecovery' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Disasterrecovery.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c43e3d16-09c4-4426-9ab9-cdda84fd5f2c' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Disasterrecovery Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Disasterrecovery.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDisasterrecoveryDrPlan', 'Get-OCIDisasterrecoveryDrPlanExecution', 'Get-OCIDisasterrecoveryDrPlanExecutionsList', 'Get-OCIDisasterrecoveryDrPlansList', 'Get-OCIDisasterrecoveryDrProtectionGroup', 'Get-OCIDisasterrecoveryDrProtectionGroupsList', 'Get-OCIDisasterrecoveryWorkRequest', 'Get-OCIDisasterrecoveryWorkRequestErrorsList', 'Get-OCIDisasterrecoveryWorkRequestLogsList', 'Get-OCIDisasterrecoveryWorkRequestsList', 'Invoke-OCIDisasterrecoveryAssociateDrProtectionGroup', 'Invoke-OCIDisasterrecoveryDisassociateDrProtectionGroup', 'Invoke-OCIDisasterrecoveryIgnoreDrPlanExecution', 'Invoke-OCIDisasterrecoveryPauseDrPlanExecution', 'Invoke-OCIDisasterrecoveryResumeDrPlanExecution', 'Invoke-OCIDisasterrecoveryRetryDrPlanExecution', 'Move-OCIDisasterrecoveryDrProtectionGroupCompartment', 'New-OCIDisasterrecoveryDrPlan', 'New-OCIDisasterrecoveryDrPlanExecution', 'New-OCIDisasterrecoveryDrProtectionGroup', 'Remove-OCIDisasterrecoveryDrPlan', 'Remove-OCIDisasterrecoveryDrPlanExecution', 'Remove-OCIDisasterrecoveryDrProtectionGroup', 'Stop-OCIDisasterrecoveryDrPlanExecution', 'Stop-OCIDisasterrecoveryWorkRequest', 'Update-OCIDisasterrecoveryDrPlan', 'Update-OCIDisasterrecoveryDrPlanExecution', 'Update-OCIDisasterrecoveryDrProtectionGroup', 'Update-OCIDisasterrecoveryDrProtectionGroupRole' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Disasterrecovery' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1164.ps1
1164.ps1
Set-StrictMode -Version 'Latest' $parentFSPath = $null $childFSPath = $null $originalAcl = $null & (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve) function Assert-AclInheritanceDisabled { param( $Path ) It 'should disable access rule inheritance' { (Get-Acl -Path $Path).AreAccessRulesProtected | Should Be $true } } function New-TestContainer { param( [Parameter(Mandatory=$true)] $Provider ) if( $Provider -eq 'FileSystem' ) { $testRoot = (Get-Item -Path 'TestDrive:').FullName $path = Join-Path -Path $testRoot -ChildPath ([IO.Path]::GetRandomFileName()) Install-Directory -Path $path } elseif( $Provider -eq 'Registry' ) { $path = ('hkcu:\Carbon+{0}\Disable-AclInheritance.Tests' -f [IO.Path]::GetRandomFileName()) Install-RegistryKey -Path $path } else { throw $Provider } Grant-Permission -Path $path -Identity $env:USERNAME -Permission FullControl It 'should have inheritance enabled' { $acl = Get-Acl -Path $path $acl.AreAccessRulesProtected | Should Be $false $acl = $null } It 'should have inherited access rules' { Get-Permission -Path $path -Inherited | Should Not BeNullOrEmpty } return $path } foreach( $provider in @( 'FileSystem', 'Registry' ) ) { Describe ('Disable-AclInheritance on {0}' -f $provider) { $path = New-TestContainer -Provider $provider Protect-Acl -Path $path Assert-AclInheritanceDisabled -Path $path It 'should not preserve inherited access rules' { [object[]]$perm = Get-Permission -Path $path -Inherited $perm.Count | Should Be 1 $perm[0].IdentityReference | Should Be (Resolve-IdentityName -Name $env:USERNAME) } } Describe ('Disable-AclInheritance on {0} when preserving inherited rules' -f $provider) { $path = New-TestContainer -Provider $provider [Security.AccessControl.AccessRule[]]$inheritedPermissions = Get-Permission -Path $path -Inherited | Where-Object { $_.IsInherited } Protect-Acl -Path $path -Preserve Assert-AclInheritanceDisabled -Path $path It 'should preserve inherited access rules' { [object[]]$currentPermissions = Get-Permission -Path $path -Inherited $currentPermissions.Count | Should Be $inheritedPermissions.Count for( $idx = 0; $idx -lt $currentPermissions.Count; ++$idx ) { $currentPermission = $currentPermissions[$idx] $inheritedPermission = $inheritedPermissions | Where-Object { $_.IdentityReference -eq $currentPermission.IdentityReference } $currentPermission.IdentityReference | Should Be $inheritedPermission.IdentityReference } } } Describe ('Disable-AclInheritance on {0} when part of a pipeline' -f $provider) { $path = New-TestContainer -Provider $provider Get-Item -Path $path | Disable-AclInheritance Assert-AclInheritanceDisabled -Path $path $path = New-TestContainer -Provider $provider $path | Disable-AclInheritance Assert-AclInheritanceDisabled -Path $path } Describe ('Disable-AclInheritandce on {0} when inheritance already disabled' -f $provider) { $path = New-TestContainer -Provider $provider Disable-AclInheritance -Path $path Assert-AclInheritanceDisabled -Path $path Mock -CommandName 'Set-Acl' -ModuleName 'Carbon' -Verifiable Disable-AclInheritance -Path $path It 'should not disable an already disabled ACL' { Assert-MockCalled -CommandName 'Set-Acl' -ModuleName 'Carbon' -Times 0 } } } Get-ChildItem -Path 'hkcu:\Carbon+*' | Remove-Item -Recurse -ErrorAction Ignore
combined_dataset/train/non-malicious/2142.ps1
2142.ps1
Describe "Using assembly" -Tags "CI" { try { Push-Location $PSScriptRoot $guid = [Guid]::NewGuid() Add-Type -OutputAssembly $PSScriptRoot\UsingAssemblyTest$guid.dll -TypeDefinition @" public class ABC {} "@ It 'parse reports error on non-existing assembly by relative path' { $err = $null $ast = [System.Management.Automation.Language.Parser]::ParseInput("using assembly foo.dll", [ref]$null, [ref]$err) $err.Count | Should -Be 1 $err[0].ErrorId | Should -Be ErrorLoadingAssembly } It 'parse reports error on assembly with non-existing fully qualified name' { $err = $null $ast = [System.Management.Automation.Language.Parser]::ParseInput("using assembly 'System.Management.Automation, Version=99.0.0.0'", [ref]$null, [ref]$err) $err.Count | Should -Be 1 $err[0].ErrorId | Should -Be ErrorLoadingAssembly } It 'not allow UNC path' { $err = $null $ast = [System.Management.Automation.Language.Parser]::ParseInput("using assembly \\networkshare\foo.dll", [ref]$null, [ref]$err) $err.Count | Should -Be 1 $err[0].ErrorId | Should -Be CannotLoadAssemblyFromUncPath } It 'not allow http path' { $err = $null $ast = [System.Management.Automation.Language.Parser]::ParseInput("using assembly http://microsoft.com/foo.dll", [ref]$null, [ref]$err) $err.Count | Should -Be 1 $err[0].ErrorId | Should -Be CannotLoadAssemblyWithUriSchema } It "parse does not load the assembly" -pending { $assemblies = [Appdomain]::CurrentDomain.GetAssemblies().GetName().Name $assemblies -contains "UsingAssemblyTest$guid" | Should -BeFalse $err = $null $ast = [System.Management.Automation.Language.Parser]::ParseInput("using assembly .\UsingAssemblyTest$guid.dll", [ref]$null, [ref]$err) $assemblies = [Appdomain]::CurrentDomain.GetAssemblies().GetName().Name $assemblies -contains "UsingAssemblyTest$guid" | Should -BeFalse $err.Count | Should -Be 0 $ast = [System.Management.Automation.Language.Parser]::ParseInput("using assembly '$PSScriptRoot\UsingAssemblyTest$guid.dll'", [ref]$null, [ref]$err) $assemblies = [Appdomain]::CurrentDomain.GetAssemblies().GetName().Name $assemblies -contains "UsingAssemblyTest$guid" | Should -BeFalse $err.Count | Should -Be 0 $ast = [System.Management.Automation.Language.Parser]::ParseInput("using assembly `"$PSScriptRoot\UsingAssemblyTest$guid.dll`"", [ref]$null, [ref]$err) $assemblies = [Appdomain]::CurrentDomain.GetAssemblies().GetName().Name $assemblies -contains "UsingAssemblyTest$guid" | Should -BeFalse $err.Count | Should -Be 0 } It "reports runtime error about non-existing assembly with relative path" { $e = { [scriptblock]::Create("using assembly .\NonExistingAssembly.dll") } | Should -Throw -ErrorId 'ParseException' -PassThru $e.Exception.InnerException.ErrorRecord.FullyQualifiedErrorId | Should -Be 'ErrorLoadingAssembly' } It "Assembly loaded at runtime" -pending { $assemblies = pwsh -noprofile -command @" using assembly .\UsingAssemblyTest$guid.dll [Appdomain]::CurrentDomain.GetAssemblies().GetName().Name "@ $assemblies -contains "UsingAssemblyTest$guid" | Should -BeTrue $assemblies = pwsh -noprofile -command @" using assembly $PSScriptRoot\UsingAssemblyTest$guid.dll [Appdomain]::CurrentDomain.GetAssemblies().GetName().Name "@ $assemblies -contains "UsingAssemblyTest$guid" | Should -BeTrue $assemblies = pwsh -noprofile -command @" using assembly System.Drawing [Appdomain]::CurrentDomain.GetAssemblies().GetName().Name "@ $assemblies -contains "System.Drawing" | Should -BeTrue $assemblies = pwsh -noprofile -command @" using assembly 'System.Drawing, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a' [Appdomain]::CurrentDomain.GetAssemblies().GetName().Name "@ $assemblies -contains "System.Drawing" | Should -BeTrue } } finally { Remove-Item .\UsingAssemblyTest$guid.dll Pop-Location } }
combined_dataset/train/non-malicious/1008.ps1
1008.ps1
$myTopic = "<your-custom-topic-name>" $myEndpoint = "<your-endpoint-URL>" $myResourceGroup = "<resource-group-name>" New-AzResourceGroup -Name $myResourceGroup -Location westus2 New-AzEventGridTopic -ResourceGroupName $myResourceGroup -Name $myTopic -Location westus2 New-AzEventGridSubscription ` -EventSubscriptionName demoSubscription ` -Endpoint $myEndpoint ` -ResourceGroupName $myResourceGroup ` -TopicName $myTopic
combined_dataset/train/non-malicious/3267.ps1
3267.ps1
class RoleManager : BaseLogger { [hashtable]$Groups = @{} [hashtable]$Permissions = @{} [hashtable]$Roles = @{} [hashtable]$RoleUserMapping = @{} hidden [object]$_Backend hidden [StorageProvider]$_Storage hidden [string[]]$_AdminPermissions = @('manage-roles', 'show-help' ,'view', 'view-role', 'view-group', 'manage-plugins', 'manage-groups', 'manage-permissions', 'manage-schedules') RoleManager([object]$Backend, [StorageProvider]$Storage, [Logger]$Logger) { $this._Backend = $Backend $this._Storage = $Storage $this.Logger = $Logger $this.Initialize() } [void]Initialize() { $this.LogInfo('Initializing') $this.LoadState() if (-not $this.Roles['Admin']) { $this.LogDebug('Creating builtin [Admin] role') $adminrole = [Role]::New('Admin', 'Bot administrator role', $this.Logger) $this._AdminPermissions | foreach-object { $p = [Permission]::new($_, 'Builtin') $adminRole.AddPermission($p) } $this.LogDebug('Added builtin permissions to [Admin] role', $this._AdminPermissions) $this.Roles.Add($adminRole.Name, $adminRole) $this.LogDebug('Creating builtin [Admin] group with [Admin] role') $adminGroup = [Group]::new('Admin', 'Bot administrators', $this.Logger) $adminGroup.AddRole($adminRole) $this.Groups.Add($adminGroup.Name, $adminGroup) $this.SaveState() } else { $adminRole = $this.Roles['Admin'] foreach ($perm in $this._AdminPermissions) { if (-not $adminRole.Permissions.ContainsKey($perm)) { $this.LogInfo("[Admin] role missing builtin permission [$perm]. Adding permission back.") $p = [Permission]::new($perm, 'Builtin') $adminRole.AddPermission($p) } } } } [void]SaveState() { $this.LogDebug('Saving role manager state to storage') $permissionsToSave = @{} foreach ($permission in $this.Permissions.GetEnumerator()) { $permissionsToSave.Add($permission.Name, $permission.Value.ToHash()) } $this._Storage.SaveConfig('permissions', $permissionsToSave) $rolesToSave = @{} foreach ($role in $this.Roles.GetEnumerator()) { $rolesToSave.Add($role.Name, $role.Value.ToHash()) } $this._Storage.SaveConfig('roles', $rolesToSave) $groupsToSave = @{} foreach ($group in $this.Groups.GetEnumerator()) { $groupsToSave.Add($group.Name, $group.Value.ToHash()) } $this._Storage.SaveConfig('groups', $groupsToSave) } [void]LoadState() { $this.LogDebug('Loading role manager state from storage') $permissionConfig = $this._Storage.GetConfig('permissions') if ($permissionConfig) { foreach($permKey in $permissionConfig.Keys) { $perm = $permissionConfig[$permKey] $p = [Permission]::new($perm.Name, $perm.Plugin) if ($perm.Adhoc) { $p.Adhoc = $perm.Adhoc } if ($perm.Description) { $p.Description = $perm.Description } if (-not $this.Permissions.ContainsKey($p.ToString())) { $this.Permissions.Add($p.ToString(), $p) } } } $roleConfig = $this._Storage.GetConfig('roles') if ($roleConfig) { foreach ($roleKey in $roleConfig.Keys) { $role = $roleConfig[$roleKey] $r = [Role]::new($roleKey, $this.Logger) if ($role.Description) { $r.Description = $role.Description } if ($role.Permissions) { foreach ($perm in $role.Permissions) { if ($p = $this.Permissions[$perm]) { $r.AddPermission($p) } } } if (-not $this.Roles.ContainsKey($r.Name)) { $this.Roles.Add($r.Name, $r) } } } $groupConfig = $this._Storage.GetConfig('groups') if ($groupConfig) { foreach ($groupKey in $groupConfig.Keys) { $group = $groupConfig[$groupKey] $g = [Group]::new($groupKey, $this.Logger) if ($group.Description) { $g.Description = $group.Description } if ($group.Users) { foreach ($u in $group.Users) { $g.AddUser($u) } } if ($group.Roles) { foreach ($r in $group.Roles) { if ($ro = $this.GetRole($r)) { $g.AddRole($ro) } } } if (-not $this.Groups.ContainsKey($g.Name)) { $this.Groups.Add($g.Name, $g) } } } } [Group]GetGroup([string]$Groupname) { if ($g = $this.Groups[$Groupname]) { return $g } else { $this.LogInfo([LogSeverity]::Warning, "Group [$Groupname] not found") return $null } } [void]UpdateGroupDescription([string]$Groupname, [string]$Description) { if ($g = $this.Groups[$Groupname]) { $g.Description = $Description $this.SaveState() } else { $this.LogInfo([LogSeverity]::Warning, "Group [$Groupname] not found") } } [void]UpdateRoleDescription([string]$Rolename, [string]$Description) { if ($r = $this.Roles[$Rolename]) { $r.Description = $Description $this.SaveState() } else { $this.LogInfo([LogSeverity]::Warning, "Role [$Rolename] not found") } } [Permission]GetPermission([string]$PermissionName) { $p = $this.Permissions[$PermissionName] if ($p) { return $p } else { $this.LogInfo([LogSeverity]::Warning, "Permission [$PermissionName] not found") return $null } } [Role]GetRole([string]$RoleName) { $r = $this.Roles[$RoleName] if ($r) { return $r } else { $this.LogInfo([LogSeverity]::Warning, "Role [$RoleName] not found") return $null } } [void]AddGroup([Group]$Group) { if (-not $this.Groups.ContainsKey($Group.Name)) { $this.LogVerbose("Adding group [$($Group.Name)]") $this.Groups.Add($Group.Name, $Group) $this.SaveState() } else { $this.LogInfo([LogSeverity]::Warning, "Group [$($Group.Name)] is already loaded") } } [void]AddPermission([Permission]$Permission) { if (-not $this.Permissions.ContainsKey($Permission.ToString())) { $this.LogVerbose("Adding permission [$($Permission.Name)]") $this.Permissions.Add($Permission.ToString(), $Permission) $this.SaveState() } else { $this.LogInfo([LogSeverity]::Warning, "Permission [$($Permission.Name)] is already loaded") } } [void]AddRole([Role]$Role) { if (-not $this.Roles.ContainsKey($Role.Name)) { $this.LogVerbose("Adding role [$($Role.Name)]") $this.Roles.Add($Role.Name, $Role) $this.SaveState() } else { $this.LogInfo([LogSeverity]::Warning, "Role [$($Role.Name)] is already loaded") } } [void]RemoveGroup([Group]$Group) { if ($this.Groups.ContainsKey($Group.Name)) { $this.LogVerbose("Removing group [$($Group.Name)]") $this.Groups.Remove($Group.Name) $this.SaveState() } else { $this.LogInfo([LogSeverity]::Warning, "Group [$($Group.Name)] was not found") } } [void]RemovePermission([Permission]$Permission) { if (-not $this.Permissions.ContainsKey($Permission.ToString())) { foreach ($role in $this.Roles.GetEnumerator()) { if ($role.Value.Permissions.ContainsKey($Permission.ToString())) { $this.LogVerbose("Removing permission [$($Permission.ToString())] from role [$($role.Value.Name)]") $role.Value.RemovePermission($Permission) } } $this.LogVerbose("Removing permission [$($Permission.ToString())]") $this.Permissions.Remove($Permission.ToString()) $this.SaveState() } else { $this.LogInfo([LogSeverity]::Warning, "Permission [$($Permission.ToString())] was not found") } } [void]RemoveRole([Role]$Role) { if ($this.Roles.ContainsKey($Role.Name)) { foreach ($group in $this.Groups.GetEnumerator()) { if ($group.Value.Roles.ContainsKey($Role.Name)) { $this.LogVerbose("Removing role [$($Role.Name)] from group [$($group.Value.Name)]") $group.Value.RemoveRole($Role) } } $this.LogVerbose("Removing role [$($Role.Name)]") $this.Roles.Remove($Role.Name) $this.SaveState() } else { $this.LogInfo([LogSeverity]::Warning, "Role [$($Role.Name)] was not found") } } [void]AddRoleToGroup([string]$RoleName, [string]$GroupName) { try { if ($role = $this.GetRole($RoleName)) { if ($group = $this.Groups[$GroupName]) { $this.LogVerbose("Adding role [$RoleName] to group [$($group.Name)]") $group.AddRole($role) $this.SaveState() } else { $msg = "Unknown group [$GroupName]" $this.LogInfo([LogSeverity]::Warning, $msg) throw $msg } } else { $msg = "Unable to find role [$RoleName]" $this.LogInfo([LogSeverity]::Warning, $msg) throw $msg } } catch { throw $_ } } [void]AddUserToGroup([string]$UserId, [string]$GroupName) { try { if ($this._Backend.GetUser($UserId)) { if ($group = $this.Groups[$GroupName]) { $this.LogVerbose("Adding user [$UserId] to [$($group.Name)]") $group.AddUser($UserId) $this.SaveState() } else { $msg = "Unknown group [$GroupName]" $this.LogInfo([LogSeverity]::Warning, $msg) throw $msg } } else { $msg = "Unable to find user [$UserId]" $this.LogInfo([LogSeverity]::Warning, $msg) throw $msg } } catch { $this.LogInfo([LogSeverity]::Error, "Exception adding [$UserId] to [$GroupName]", $_) throw $_ } } [void]RemoveRoleFromGroup([string]$RoleName, [string]$GroupName) { try { if ($role = $this.GetRole($RoleName)) { if ($group = $this.Groups[$GroupName]) { $this.LogVerbose("Removing role [$RoleName] from group [$($group.Name)]") $group.RemoveRole($role) $this.SaveState() } else { $msg = "Unknown group [$GroupName]" $this.LogInfo([LogSeverity]::Warning, $msg) throw $msg } } else { $msg = "Unable to find role [$RoleName]" $this.LogInfo([LogSeverity]::Warning, $msg) throw $msg } } catch { $this.LogInfo([LogSeverity]::Error, "Exception removing [$RoleName] from [$GroupName]", $_) throw $_ } } [void]RemoveUserFromGroup([string]$UserId, [string]$GroupName) { try { if ($group = $this.Groups[$GroupName]) { if ($group.Users.ContainsKey($UserId)) { $this.LogVerbose("Removing user [$UserId] from group [$($group.Name)]") $group.RemoveUser($UserId) $this.SaveState() } } else { $msg = "Unknown group [$GroupName]" $this.LogInfo([LogSeverity]::Warning, $msg) throw $msg } } catch { $this.LogInfo([LogSeverity]::Error, "Exception removing [$UserId] from [$GroupName]", $_) throw $_ } } [void]AddPermissionToRole([string]$PermissionName, [string]$RoleName) { try { if ($role = $this.GetRole($RoleName)) { if ($perm = $this.Permissions[$PermissionName]) { $this.LogVerbose("Adding permission [$PermissionName] to role [$($role.Name)]") $role.AddPermission($perm) $this.SaveState() } else { $msg = "Unknown permission [$perm]" $this.LogInfo([LogSeverity]::Warning, $msg) throw $msg } } else { $msg = "Unable to find role [$RoleName]" $this.LogInfo([LogSeverity]::Warning, $msg) throw $msg } } catch { $this.LogInfo([LogSeverity]::Error, "Exception adding [$PermissionName] to [$RoleName]", $_) throw $_ } } [void]RemovePermissionFromRole([string]$PermissionName, [string]$RoleName) { try { if ($role = $this.GetRole($RoleName)) { if ($perm = $this.Permissions[$PermissionName]) { $this.LogVerbose("Removing permission [$PermissionName] from role [$($role.Name)]") $role.RemovePermission($perm) $this.SaveState() } else { $msg = "Unknown permission [$PermissionName]" $this.LogInfo([LogSeverity]::Warning, $msg) throw $msg } } else { $msg = "Unable to find role [$RoleName]" $this.LogInfo([LogSeverity]::Warning, $msg) throw $msg } } catch { $this.LogInfo([LogSeverity]::Error, "Exception removing [$PermissionName] from [$RoleName]", $_) throw $_ } } [Group[]]GetUserGroups([string]$UserId) { $userGroups = New-Object System.Collections.ArrayList foreach ($group in $this.Groups.GetEnumerator()) { if ($group.Value.Users.ContainsKey($UserId)) { $userGroups.Add($group.Value) } } return $userGroups } [Role[]]GetUserRoles([string]$UserId) { $userRoles = New-Object System.Collections.ArrayList foreach ($group in $this.GetUserGroups($UserId)) { foreach ($role in $group.Roles.GetEnumerator()) { $userRoles.Add($role.Value) } } return $userRoles } [Permission[]]GetUserPermissions([string]$UserId) { $userPermissions = New-Object System.Collections.ArrayList if ($userRoles = $this.GetUserRoles($UserId)) { foreach ($role in $userRoles) { $userPermissions.AddRange($role.Permissions.Keys) } } return $userPermissions } [string]ResolveUserIdToUserName([string]$Id) { return $this._Backend.UserIdToUsername($Id) } [string]ResolveUsernameToId([string]$Username) { return $this._Backend.UsernameToUserId($Username) } }
combined_dataset/train/non-malicious/2919.ps1
2919.ps1
task default -depends Test task Test -depends Compile, Clean { Assert $false "This fails." } task Compile -depends Clean { "Compile" } task Clean { "Clean" } taskTearDown { "$($psake.context.Peek().currentTaskName) Tear Down" }
combined_dataset/train/non-malicious/3636.ps1
3636.ps1
function Test-ListServerAdvisors { $rg = Create-ResourceGroupForTest $server = SetupServer $rg try { $response = Get-AzSqlServerAdvisor ` -ResourceGroupName $server.ResourceGroupName ` -ServerName $server.ServerName Assert-NotNull $response ValidateAdvisorCount $response foreach($advisor in $response) { ValidateServer $advisor $server ValidateAdvisorProperties $advisor } } finally { Remove-ResourceGroupForTest $rg } } function Test-ListServerAdvisorsExpanded { $rg = Create-ResourceGroupForTest $server = SetupServer $rg try { $response = Get-AzSqlServerAdvisor ` -ResourceGroupName $server.ResourceGroupName ` -ServerName $server.ServerName -ExpandRecommendedActions ` -AdvisorName * Assert-NotNull $response ValidateAdvisorCount $response foreach($advisor in $response) { ValidateServer $advisor $server ValidateAdvisorProperties $advisor } } finally { Remove-ResourceGroupForTest $rg } } function Test-GetServerAdvisor { $rg = Create-ResourceGroupForTest $server = SetupServer $rg try { $response = Get-AzSqlServerAdvisor ` -ResourceGroupName $server.ResourceGroupName ` -ServerName $server.ServerName -AdvisorName CreateIndex Assert-NotNull $response ValidateServer $response $server ValidateAdvisorProperties $response } finally { Remove-ResourceGroupForTest $rg } } function Test-UpdateServerAdvisor { $rg = Create-ResourceGroupForTest $server = SetupServer $rg try { $response = Set-AzSqlServerAdvisorAutoExecuteStatus ` -ResourceGroupName $server.ResourceGroupName ` -ServerName $server.ServerName ` -AdvisorName CreateIndex ` -AutoExecuteStatus Disabled Assert-NotNull $response ValidateServer $response $server ValidateAdvisorProperties $response } finally { Remove-ResourceGroupForTest $rg } } function Test-ListDatabaseAdvisors { $rg = Create-ResourceGroupForTest $db = SetupDatabase $rg try { $response = Get-AzSqlDatabaseAdvisor ` -ResourceGroupName $db.ResourceGroupName ` -ServerName $db.ServerName ` -DatabaseName $db.DatabaseName ` -AdvisorName * Assert-NotNull $response ValidateAdvisorCount $response foreach($advisor in $response) { ValidateDatabase $advisor $db ValidateAdvisorProperties $advisor } } finally { Remove-ResourceGroupForTest $rg } } function Test-ListDatabaseAdvisorsExpanded { $rg = Create-ResourceGroupForTest $db = SetupDatabase $rg try { $response = Get-AzSqlDatabaseAdvisor ` -ResourceGroupName $db.ResourceGroupName ` -ServerName $db.ServerName ` -DatabaseName $db.DatabaseName ` -ExpandRecommendedActions Assert-NotNull $response ValidateAdvisorCount $response foreach($advisor in $response) { ValidateDatabase $advisor $db ValidateAdvisorProperties $advisor } } finally { Remove-ResourceGroupForTest $rg } } function Test-GetDatabaseAdvisor { $rg = Create-ResourceGroupForTest $db = SetupDatabase $rg try { $response = Get-AzSqlDatabaseAdvisor ` -ResourceGroupName $db.ResourceGroupName ` -ServerName $db.ServerName ` -DatabaseName $db.DatabaseName ` -AdvisorName CreateIndex Assert-NotNull $response ValidateDatabase $response $db ValidateAdvisorProperties $response } finally { Remove-ResourceGroupForTest $rg } } function Test-UpdateDatabaseAdvisor { $rg = Create-ResourceGroupForTest $db = SetupDatabase $rg try { $response = Set-AzSqlDatabaseAdvisorAutoExecuteStatus ` -ResourceGroupName $db.ResourceGroupName ` -ServerName $db.ServerName ` -DatabaseName $db.DatabaseName ` -AdvisorName CreateIndex ` -AutoExecuteStatus Disabled Assert-NotNull $response ValidateDatabase $response $db ValidateAdvisorProperties $response } finally { Remove-ResourceGroupForTest $rg } } function Test-ListElasticPoolAdvisors { $rg = Create-ResourceGroupForTest $ep = SetupElasticPool $rg try { $response = Get-AzSqlElasticPoolAdvisor ` -ResourceGroupName $ep.ResourceGroupName` -ServerName $ep.ServerName` -ElasticPoolName $ep.ElasticPoolName ` -AdvisorName * Assert-NotNull $response ValidateAdvisorCount $response foreach($advisor in $response) { ValidateElasticPool $advisor $ep ValidateAdvisorProperties $advisor } } finally { Remove-ResourceGroupForTest $rg } } function Test-ListElasticPoolAdvisorsExpanded { $rg = Create-ResourceGroupForTest $ep = SetupElasticPool $rg try { $response = Get-AzSqlElasticPoolAdvisor ` -ResourceGroupName $ep.ResourceGroupName ` -ServerName $ep.ServerName ` -ElasticPoolName $ep.ElasticPoolName ` -ExpandRecommendedActions Assert-NotNull $response ValidateAdvisorCount $response foreach($advisor in $response) { ValidateElasticPool $advisor $ep ValidateAdvisorProperties $advisor } } finally { Remove-ResourceGroupForTest $rg } } function Test-GetElasticPoolAdvisor { $rg = Create-ResourceGroupForTest $ep = SetupElasticPool $rg try { $response = Get-AzSqlElasticPoolAdvisor ` -ResourceGroupName $ep.ResourceGroupName ` -ServerName $ep.ServerName ` -ElasticPoolName $ep.ElasticPoolName ` -AdvisorName CreateIndex Assert-NotNull $response ValidateElasticPool $response $ep ValidateAdvisorProperties $response } finally { Remove-ResourceGroupForTest $rg } } function SetupServer($resourceGroup) { $location = "Southeast Asia" $server = Create-ServerForTest $resourceGroup $location return $server } function SetupDatabase($resourceGroup) { $server = SetupServer $resourceGroup $databaseName = Get-DatabaseName $db = New-AzSqlDatabase ` -ResourceGroupName $server.ResourceGroupName ` -ServerName $server.ServerName ` -DatabaseName $databaseName ` -Edition Basic return $db } function SetupElasticPool($resourceGroup) { $server = SetupServer $resourceGroup $poolName = Get-ElasticPoolName $ep = New-AzSqlElasticPool ` -ServerName $server.ServerName ` -ResourceGroupName $server.ResourceGroupName ` -ElasticPoolName $poolName -Edition Basic return $ep } function ValidateServer($responseAdvisor, $expectedServer) { Assert-AreEqual $responseAdvisor.ResourceGroupName $expectedServer.ResourceGroupName Assert-AreEqual $responseAdvisor.ServerName $expectedServer.ServerName } function ValidateDatabase($responseAdvisor, $expectedDatabase) { Assert-AreEqual $responseAdvisor.ResourceGroupName $expectedDatabase.ResourceGroupName Assert-AreEqual $responseAdvisor.ServerName $expectedDatabase.ServerName Assert-AreEqual $responseAdvisor.DatabaseName $expectedDatabase.DatabaseName } function ValidateElasticPool($responseAdvisor, $expectedElasticPool) { Assert-AreEqual $responseAdvisor.ResourceGroupName $expectedElasticPool.ResourceGroupName Assert-AreEqual $responseAdvisor.ServerName $expectedElasticPool.ServerName Assert-AreEqual $responseAdvisor.ElasticPoolName $expectedElasticPool.ElasticPoolName } function ValidateAdvisorProperties($advisor, $expanded = $false) { Assert-True {($advisor.AdvisorStatus -eq "GA") ` -or ($advisor.AdvisorStatus -eq "PublicPreview") ` -or ($advisor.AdvisorStatus -eq "PrivatePreview")} Assert-AreEqual "Disabled" $advisor.AutoExecuteStatus Assert-True {($advisor.AutoExecuteStatusInheritedFrom -eq "Default") -or ` ($advisor.AutoExecuteStatusInheritedFrom -eq "Server") -or ` ($advisor.AutoExecuteStatusInheritedFrom -eq "ElasticPool") -or ` ($advisor.AutoExecuteStatusInheritedFrom -eq "Database")} } function ValidateAdvisorCount($response) { $expectedMinAdvisorCount = 4 Assert-True { $response.Count -ge $expectedMinAdvisorCount } "Advisor count was $($response.Count), expected at least $expectedMinAdvisorCount. Response: $response" }
combined_dataset/train/non-malicious/2373.ps1
2373.ps1
function Compare-Folder { [CmdletBinding()] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [ValidateScript({ Test-Path -Path $_ -PathType Container })] [string]$ReferenceFolder, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [ValidateScript({ Test-Path -Path $_ -PathType Container })] [string]$DifferenceFolder, [Parameter()] [ValidateNotNullOrEmpty()] [ValidatePattern('^\\')] [string]$ExcludeFilePath ) begin { $ErrorActionPreference = 'Stop' function Get-FileHashesInFolder { param ( [string]$Folder ) $files = Get-ChildItem -Path $Folder -Recurse -File foreach ($s in $files) { $selectObjects = @('Hash', @{ n = 'Path'; e = { $_.Path.SubString($Folder.Length) } }) Get-FileHash $s.Fullname | Select $selectObjects -ExcludeProperty Path } } } process { try { $refHashes = Get-FileHashesInFolder -Folder $ReferenceFolder $destHashes = Get-FileHashesInFolder -Folder $DifferenceFolder if ($PSBoundParameters.ContainsKey('ExcludeFilePath')) { $refHashes = $refHashes.Where({ $_.Path -ne $ExcludeFilePath }) $destHashes = $destHashes.Where({ $_.Path -ne $ExcludeFilePath }) } $refHashes.Where({ $_.Path -notin $destHashes.Path }).foreach({ [pscustomobject]@{ 'Path' = $_.Path 'Reason' = 'NotInDifferenceFolder' } }) $destHashes.Where({ $_.Path -notin $refHashes.Path }).foreach({ [pscustomobject]@{ 'Path' = $_.Path 'Reason' = 'NotInReferenceFolder' } }) $refHashes.Where({ $_.Hash -notin $destHashes.Hash -and $_.Path -in $destHashes.Path }).foreach({ [pscustomobject]@{ 'Path' = $_.Path 'Reason' = 'HashDifferent' } }) } catch { Write-Error $_.Exception.Message } } }
combined_dataset/train/non-malicious/Start-ComputerJobs.ps1
Start-ComputerJobs.ps1
#requires -version 2.0 function Start-ComputerJobs{ <# .NOTES Name: Start-ComputerJobs Author: Tome Tanasovski Created: 6/25/2010 Version: 1.0 Website: http://powertoe.wordpress.com .SYNOPSIS Multithreads a scriptblock with jobs .DESCRIPTION The Start-ComputerJobs cmdlet runs a specified scriptblock within a maximum number of simultaneously spawned Powershell jobs. You must pass a list of ComputerNames to it. The names passed to the cmdlet will replace $computername within the scriptblock prior to starting each thread. This can be thought of as a multithreaded approach to a foreach loop. .PARAMETER ComputerName Specifies a list of computers that you wish to inject into your scriptblock. The list of computer names will replace $computername in the script block. This does not actually need to be a list of computer names. It can be anything you wish to inject into your scriptblock. .PARAMETER ScriptBlock Specifies the commands to run in the background jobs. Enclose the commands in braces ({}) or use $ExecutionContext.InvokeCommand.NewScriptBlock to create a scriptblock. The scriptblock must contain a $computername variable. $computername will be replaced by each entry into the pipeline or from the parameter ComputerName. .PARAMETER Threads Specifies the maximum number of jobs that can be simultaneously running at any given time. This defaults to 10 if nothing is specified. .EXAMPLE "computer1","computer2","computer3","computer4","computer5" |Start-ComputerJobs -ScriptBlock {dir \\\\$computername\\c$} .INPUTS System.String .OUTPUTS PSObject Returns the results of the commands in the job. It is the data returned from receive-job. If you're scriptblock contains write-host it will write that to the console as it is running. To avoid this you should just return objects within your scriptblock. i.e. Instead of write-host "text" just use "text" #> param( [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [string[]]$ComputerName, [Parameter(Mandatory=$true)] [ScriptBlock]$ScriptBlock, [Parameter(Mandatory=$false)] [ValidateScript({$_ -gt 0})] [int32]$Threads = 10, [Parameter(Mandatory=$false)] [ValidateScript({$_ -gt 0})] [int32]$Sleep = 5 ) BEGIN { $firstrun = $true $computers = @() $curthreads = 0 $jobs = @() $valid = $false } PROCESS { if ($firstrun) { $firstrun = $false # Validate scriptblock - Making sure it has a $computername variable to use if ($ScriptBlock -match '\\$computername') { $valid = $true } else { Write-Error 'You must specify a scriptblock that contains a variable called $computername' $valid = $false } } if ($valid) { foreach ($computer in $computername) { while ($jobs.count -eq $Threads) { $newjobs = @() $jobs |foreach { $_ |Receive-Job -NoRecurse if ($_.state -eq "Running" -or $_.HasMoreData) { $newjobs += $_ } else { $_ |Remove-Job } } $jobs = $newjobs if ($jobs.count -eq $Threads) { sleep $sleep } } $runscript = $ExecutionContext.InvokeCommand.NewScriptBlock(($ScriptBlock -replace '\\$computername', """$computer""")) Write-Verbose "Starting Job for computer: $computer" $jobs += Start-Job -ScriptBlock $runscript $curthreads++ } } } END { while ($jobs.count -ne 0) { $newjobs = @() $jobs |foreach { $_ |Receive-Job -NoRecurse if ($_.state -eq "Running" -or $_.HasMoreData) { $newjobs += $_ } else { $_ |Remove-Job } } $jobs = $newjobs if ($jobs.count -gt 0) { sleep $sleep } } } }
combined_dataset/train/non-malicious/Is-Natural.ps1
Is-Natural.ps1
function is-natural{ param ($number) if($number -like "*.*" -or $number -like "*-*"){ return $false }else{return $true} }
combined_dataset/train/non-malicious/UIAutomation _1.6.ps1
UIAutomation _1.6.ps1
## UI Automation v 1.7 -- REQUIRES the Reflection module (current version: http://poshcode.org/2480 ) ## # WASP 2.0 is getting closer, but this is still just a preview: # -- a lot of the commands have weird names still because they're being generated ignorantly # -- eg: Invoke-Toggle.Toggle and Invoke-Invoke.Invoke # v 1.7 - Fixes using multiple checks like: Select-UIElement Red: Edit Add-Type -AssemblyName "UIAutomationClient, Version=3.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" Add-Type -AssemblyName "UIAutomationTypes, Version=3.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" $SWA = "System.Windows.Automation" # Add-Accelerator InvokePattern "$SWA.InvokePattern" -EA SilentlyContinue # Add-Accelerator ExpandPattern "$SWA.ExpandCollapsePattern" -EA SilentlyContinue # Add-Accelerator WindowPattern "$SWA.WindowPattern" -EA SilentlyContinue # Add-Accelerator TransformPattern "$SWA.TransformPattern" -EA SilentlyContinue # Add-Accelerator ValuePattern "$SWA.ValuePattern" -EA SilentlyContinue # Add-Accelerator TextPattern "$SWA.TextPattern" -EA SilentlyContinue # This is what requires the Reflection module: Add-Accelerator Automation "$SWA.Automation" -EA SilentlyContinue Add-Accelerator AutomationElement "$SWA.AutomationElement" -EA SilentlyContinue Add-Accelerator TextRange "$SWA.Text.TextPatternRange" -EA SilentlyContinue ##### Conditions Add-Accelerator Condition "$SWA.Condition" -EA SilentlyContinue Add-Accelerator AndCondition "$SWA.AndCondition" -EA SilentlyContinue Add-Accelerator OrCondition "$SWA.OrCondition" -EA SilentlyContinue Add-Accelerator NotCondition "$SWA.NotCondition" -EA SilentlyContinue Add-Accelerator PropertyCondition "$SWA.PropertyCondition" -EA SilentlyContinue ##### IDentifiers Add-Accelerator AutoElementIds "$SWA.AutomationElementIdentifiers" -EA SilentlyContinue Add-Accelerator TransformIds "$SWA.TransformPatternIdentifiers" -EA SilentlyContinue ##### Patterns: $patterns = Get-Type -Assembly UIAutomationClient -Base System.Windows.Automation.BasePattern #| Where { $_ -ne [System.Windows.Automation.InvokePattern] } Add-Type -TypeDefinition @" using System; using System.ComponentModel; using System.Management.Automation; using System.Reflection; using System.Text.RegularExpressions; using System.Windows.Automation; using System.Runtime.InteropServices; [AttributeUsage(AttributeTargets.Field | AttributeTargets.Property)] public class StaticFieldAttribute : ArgumentTransformationAttribute { private Type _class; public override string ToString() { return string.Format("[StaticField(OfClass='{0}')]", OfClass.FullName); } public override Object Transform( EngineIntrinsics engineIntrinsics, Object inputData) { if(inputData is string && !string.IsNullOrEmpty(inputData as string)) { System.Reflection.FieldInfo field = _class.GetField(inputData as string, BindingFlags.Static | BindingFlags.Public); if(field != null) { return field.GetValue(null); } } return inputData; } public StaticFieldAttribute( Type ofClass ) { OfClass = ofClass; } public Type OfClass { get { return _class; } set { _class = value; } } } public static class UIAutomationHelper { [DllImport ("user32.dll", CharSet = CharSet.Auto)] static extern IntPtr FindWindow (string lpClassName, string lpWindowName); [DllImport ("user32.dll", CharSet = CharSet.Auto)] static extern bool AttachThreadInput (int idAttach, int idAttachTo, bool fAttach); [DllImport ("user32.dll", CharSet = CharSet.Auto)] static extern int GetWindowThreadProcessId (IntPtr hWnd, IntPtr lpdwProcessId); [DllImport ("user32.dll", CharSet = CharSet.Auto)] static extern IntPtr SetForegroundWindow (IntPtr hWnd); public static AutomationElement RootElement { get { return AutomationElement.RootElement; } } ///<synopsis>Using Win32 to set foreground window because AutomationElement.SetFocus() is unreliable</synopsis> public static bool SetForeground(this AutomationElement element) { if(element == null) { throw new ArgumentNullException("element"); } // Get handle to the element IntPtr other = FindWindow (null, element.Current.Name); // // Get the Process ID for the element we are trying to // // set as the foreground element // int other_id = GetWindowThreadProcessId (other, IntPtr.Zero); // // // Get the Process ID for the current process // int this_id = GetWindowThreadProcessId (Process.GetCurrentProcess().Handle, IntPtr.Zero); // // // Attach the current process's input to that of the // // given element. We have to do this otherwise the // // WM_SETFOCUS message will be ignored by the element. // bool success = AttachThreadInput(this_id, other_id, true); // Make the Win32 call IntPtr previous = SetForegroundWindow(other); return !IntPtr.Zero.Equals(previous); } } "@ -ReferencedAssemblies UIAutomationClient, UIAutomationTypes ## TODO: Write Get-SupportedPatterns or rather ... ## Get-SupportedFunctions (to return the names of the functions for the supported patterns) ## TODO: Support all the "Properties" too ## TODO: Figure out why Notepad doesn't support SetValue ## TODO: Figure out where the menus support went ForEach($pattern in $patterns){ $pattern | Add-Accelerator $PatternFullName = $pattern.FullName $PatternName = $Pattern.Name -Replace "Pattern","." $newline = "`n`t`t" New-Item "Function:ConvertTo-$($Pattern.Name)" -Value " param( [Parameter(ValueFromPipeline=`$true)][Alias('Element','AutomationElement')][AutomationElement]`$InputObject ) process { trap { if(`$_.Exception.Message -like '*Unsupported Pattern.*') { Write-Error `"Cannot get ```"$($Pattern.Name)```" from that AutomationElement, `$(`$_)` You should try one of: `$(`$InputObject.GetSupportedPatterns()|%{```"'```" + (`$_.ProgrammaticName.Replace(```"PatternIdentifiers.Pattern```",```"```")) + ```"Pattern'```"})`"; continue; } } Write-Output `$InputObject.GetCurrentPattern([$PatternFullName]::Pattern).Current }" $pattern.GetMethods() | Where { $_.DeclaringType -eq $_.ReflectedType -and !$_.IsSpecialName } | ForEach { $FunctionName = "Function:Invoke-$PatternName$($_.Name)" $Position = 1 if (test-path $FunctionName) { remove-item $FunctionName } $Parameters = @("$newline[Parameter(ValueFromPipeline=`$true)]"+ "$newline[Alias('Parent','Element','Root','AutomationElement')]"+ "$newline[AutomationElement]`$InputObject" ) + @( "[Parameter()]$newline[Switch]`$Passthru" ) + @($_.GetParameters() | % { "[Parameter(Position=$($Position; $Position++))]$newline[$($_.ParameterType.FullName)]`$$($_.Name)" }) $Parameters = $Parameters -Join "$newline,$newline" $ParameterValues = '$' + (@($_.GetParameters() | Select-Object -Expand Name ) -Join ', $') $definition = @" param( $Parameters ) process { ## trap { Write-Warning "`$(`$_)"; break } `$pattern = `$InputObject.GetCurrentPattern([$PatternFullName]::Pattern) if(`$pattern) { `$Pattern.$($_.Name)($(if($ParameterValues.Length -gt 1){ $ParameterValues })) } if(`$passthru) { `$InputObject } } "@ trap { Write-Warning $_ Write-Host $definition -fore cyan } New-Item $FunctionName -value $definition } $pattern.GetProperties() | Where { $_.DeclaringType -eq $_.ReflectedType -and $_.Name -notmatch "Cached|Current"} | ForEach { $FunctionName = "Function:Get-$PatternName$($_.Name)".Trim('.') if (test-path $FunctionName) { remove-item $FunctionName } New-Item $FunctionName -value " param( [Parameter(ValueFromPipeline=`$true)] [AutomationElement]`$AutomationElement ) process { trap { Write-Warning `"$PatternFullName `$_`"; continue } `$pattern = `$AutomationElement.GetCurrentPattern([$PatternFullName]::Pattern) if(`$pattern) { `$pattern.'$($_.Name)' } }" } ## So far this seems to be restricted to Text (DocumentRange) elements $pattern.GetFields() | Where { $_.FieldType.Name -like "*TextAttribute"} | ForEach { $FunctionName = "Function:Get-Text$($_.Name -replace 'Attribute')" if (test-path $FunctionName) { remove-item $FunctionName } New-Item $FunctionName -value " param( [Parameter(ValueFromPipeline=`$true)] [AutomationElement]`$AutomationElement ) process { trap { Write-Warning `"$PatternFullName `$_`"; continue } `$AutomationElement.GetAttributeValue([$PatternFullName]::$($_.Name)) }" } $pattern.GetFields() | Where { $_.FieldType -eq [System.Windows.Automation.AutomationEvent] } | ForEach { $Name = $_.Name -replace 'Event$' $FunctionName = "Function:Register-$($PatternName.Trim('.'))$Name" if (test-path $FunctionName) { remove-item $FunctionName } New-Item $FunctionName -value " param( [Parameter(ValueFromPipeline=`$true)] [AutomationElement]`$AutomationElement , [System.Windows.Automation.TreeScope]`$TreeScope = 'Element' , [ScriptBlock]`$EventHandler ) process { trap { Write-Warning `"$PatternFullName `$_`"; continue } [Automation]::AddAutomationEventHandler( [$PatternFullName]::$Name, `$AutomationElement, `$TreeScope, `$EventHandler ) }" } } $FalseCondition = [Condition]::FalseCondition $TrueCondition = [Condition]::TrueCondition Add-Type -AssemblyName System.Windows.Forms Add-Accelerator SendKeys System.Windows.Forms.SendKeys -EA SilentlyContinue $AutomationProperties = [system.windows.automation.automationelement+automationelementinformation].GetProperties() Set-Alias Invoke-UIElement Invoke-Invoke.Invoke function formatter { END { $input | Format-Table @{l="Text";e={$_.Text.SubString(0,25)}}, ClassName, FrameworkId -Auto }} function Get-ClickablePoint { [CmdletBinding()] param( [Parameter(ValueFromPipeline=$true)] [Alias("Parent","Element","Root")] [AutomationElement]$InputObject ) process { $InputObject.GetClickablePoint() } } function Show-Window { [CmdletBinding()] param( [Parameter(ValueFromPipeline=$true)] [Alias("Parent","Element","Root")] [AutomationElement]$InputObject , [Parameter()] [Switch]$Passthru ) process { Set-UIFocus $InputObject if($passthru) { $InputObject } } } function Set-UIFocus { [CmdletBinding()] param( [Parameter(ValueFromPipeline=$true)] [Alias("Parent","Element","Root")] [AutomationElement]$InputObject , [Parameter()] [Switch]$Passthru ) process { try { [UIAutomationHelper]::SetForeground( $InputObject ) $InputObject.SetFocus() } catch { Write-Verbose "SetFocus fail, trying SetForeground" } if($passthru) { $InputObject } } } function Send-UIKeys { [CmdletBinding()] param( [Parameter(Position=0)] [string]$Keys , [Parameter(ValueFromPipeline=$true)] [Alias("Parent","Element","Root")] [AutomationElement]$InputObject , [Parameter()] [Switch]$Passthru , [Parameter()] [Switch]$Async ) process { if(!$InputObject.Current.IsEnabled) { Write-Warning "The Control is not enabled!" } if(!$InputObject.Current.IsKeyboardFocusable) { Write-Warning "The Control is not focusable!" } Set-UIFocus $InputObject if($Async) { [SendKeys]::Send( $Keys ) } else { [SendKeys]::SendWait( $Keys ) } if($passthru) { $InputObject } } } function Set-UIText { [CmdletBinding()] param( [Parameter(Position=0)] [string]$Text , [Parameter(ValueFromPipeline=$true)] [Alias("Parent","Element","Root")] [AutomationElement]$InputObject , [Parameter()] [Switch]$Passthru ) process { if(!$InputObject.Current.IsEnabled) { Write-Warning "The Control is not enabled!" } if(!$InputObject.Current.IsKeyboardFocusable) { Write-Warning "The Control is not focusable!" } $valuePattern = $null if($InputObject.TryGetCurrentPattern([ValuePattern]::Pattern,[ref]$valuePattern)) { Write-Verbose "Set via ValuePattern!" $valuePattern.SetValue( $Text ) } elseif($InputObject.Current.IsKeyboardFocusable) { Set-UIFocus $InputObject [SendKeys]::SendWait("^{HOME}"); [SendKeys]::SendWait("^+{END}"); [SendKeys]::SendWait("{DEL}"); [SendKeys]::SendWait( $Text ) } if($passthru) { $InputObject } } } function Select-UIElement { [CmdletBinding(DefaultParameterSetName="FromParent")] PARAM ( [Parameter(ParameterSetName="FromWindowHandle", Position="0", Mandatory=$true)] [Alias("MainWindowHandle","hWnd","Handle","Wh")] [IntPtr[]]$WindowHandle=[IntPtr]::Zero , [Parameter(ParameterSetName="FromPoint", Position="0", Mandatory=$true)] [System.Windows.Point[]]$Point , [Parameter(ParameterSetName="FromParent", ValueFromPipeline=$true, Position=100)] [System.Windows.Automation.AutomationElement]$Parent = [UIAutomationHelper]::RootElement , [Parameter(ParameterSetName="FromParent", Position="0")] [Alias("WindowName")] [String[]]$Name , [Parameter(ParameterSetName="FromParent", Position="1")] [Alias("Type","Ct")] [System.Windows.Automation.ControlType] [StaticField(([System.Windows.Automation.ControlType]))]$ControlType , [Parameter(ParameterSetName="FromParent")] [Alias("UId")] [String[]]$AutomationId , ## Removed "Id" alias to allow get-process | Select-Window pipeline to find just MainWindowHandle [Parameter(ParameterSetName="FromParent", ValueFromPipelineByPropertyName=$true )] [Alias("Id")] [Int[]]$PID , [Parameter(ParameterSetName="FromParent")] [Alias("Pn")] [String[]]$ProcessName , [Parameter(ParameterSetName="FromParent")] [Alias("Cn")] [String[]]$ClassName , [switch]$Recurse , [switch]$Bare ) process { Write-Debug "Parameters Found" Write-Debug ($PSBoundParameters | Format-Table | Out-String) $search = "Children" if($Recurse) { $search = "Descendants" } $condition = [System.Windows.Automation.Condition]::TrueCondition Write-Verbose $PSCmdlet.ParameterSetName switch -regex ($PSCmdlet.ParameterSetName) { "FromWindowHandle" { Write-Verbose "Finding from Window Handle $HWnd" $Element = $( foreach($hWnd in $WindowHandle) { [System.Windows.Automation.AutomationElement]::FromHandle( $hWnd ) } ) continue } "FromPoint" { Write-Verbose "Finding from Point $Point" $Element = $( foreach($pt in $Point) { [System.Windows.Automation.AutomationElement]::FromPoint( $pt ) } ) continue } "FromParent" { Write-Verbose "Finding from Parent!" ## [System.Windows.Automation.Condition[]]$conditions = [System.Windows.Automation.Condition]::TrueCondition [ScriptBlock[]]$filters = @() if($AutomationId) { [System.Windows.Automation.Condition[]]$current = $( foreach($aid in $AutomationId) { new-object System.Windows.Automation.PropertyCondition ([System.Windows.Automation.AutomationElement]::AutomationIdProperty), $aid } ) if($current.Length -gt 1) { [System.Windows.Automation.Condition[]]$conditions += New-Object System.Windows.Automation.OrCondition $current } elseif($current.Length -eq 1) { [System.Windows.Automation.Condition[]]$conditions += $current[0] } } if($PID) { [System.Windows.Automation.Condition[]]$current = $( foreach($p in $PID) { new-object System.Windows.Automation.PropertyCondition ([System.Windows.Automation.AutomationElement]::ProcessIdProperty), $p } ) if($current.Length -gt 1) { [System.Windows.Automation.Condition[]]$conditions += New-Object System.Windows.Automation.OrCondition $current } elseif($current.Length -eq 1) { [System.Windows.Automation.Condition[]]$conditions += $current[0] } } if($ProcessName) { if($ProcessName -match "\\?|\\*|\\[") { [ScriptBlock[]]$filters += { $(foreach($p in $ProcessName){ (Get-Process -id $_.GetCurrentPropertyValue([System.Windows.Automation.AutomationElement]::ProcessIdProperty)).ProcessName -like $p }) -contains $true } } else { [System.Windows.Automation.Condition[]]$current = $( foreach($p in Get-Process -Name $ProcessName) { new-object System.Windows.Automation.PropertyCondition ([System.Windows.Automation.AutomationElement]::ProcessIdProperty), $p.id, "IgnoreCase" } ) if($current.Length -gt 1) { [System.Windows.Automation.Condition[]]$conditions += New-Object System.Windows.Automation.OrCondition $current } elseif($current.Length -eq 1) { [System.Windows.Automation.Condition[]]$conditions += $current[0] } } } if($Name) { Write-Verbose "Name: $Name" if($Name -match "\\?|\\*|\\[") { [ScriptBlock[]]$filters += { $(foreach($n in $Name){ $_.GetCurrentPropertyValue([System.Windows.Automation.AutomationElement]::NameProperty) -like $n }) -contains $true } } else { [System.Windows.Automation.Condition[]]$current = $( foreach($n in $Name){ new-object System.Windows.Automation.PropertyCondition ([System.Windows.Automation.AutomationElement]::NameProperty), $n, "IgnoreCase" } ) if($current.Length -gt 1) { [System.Windows.Automation.Condition[]]$conditions += New-Object System.Windows.Automation.OrCondition $current } elseif($current.Length -eq 1) { [System.Windows.Automation.Condition[]]$conditions += $current[0] } } } if($ClassName) { if($ClassName -match "\\?|\\*|\\[") { [ScriptBlock[]]$filters += { $(foreach($c in $ClassName){ $_.GetCurrentPropertyValue([System.Windows.Automation.AutomationElement]::ClassNameProperty) -like $c }) -contains $true } } else { [System.Windows.Automation.Condition[]]$current = $( foreach($c in $ClassName){ new-object System.Windows.Automation.PropertyCondition ([System.Windows.Automation.AutomationElement]::ClassNameProperty), $c, "IgnoreCase" } ) if($current.Length -gt 1) { [System.Windows.Automation.Condition[]]$conditions += New-Object System.Windows.Automation.OrCondition $current } elseif($current.Length -eq 1) { [System.Windows.Automation.Condition[]]$conditions += $current[0] } } } if($ControlType) { if($ControlType -match "\\?|\\*|\\[") { [ScriptBlock[]]$filters += { $(foreach($c in $ControlType){ $_.GetCurrentPropertyValue([System.Windows.Automation.AutomationElement]::ControlTypeProperty) -like $c }) -contains $true } } else { [System.Windows.Automation.Condition[]]$current = $( foreach($c in $ControlType){ new-object System.Windows.Automation.PropertyCondition ([System.Windows.Automation.AutomationElement]::ControlTypeProperty), $c } ) if($current.Length -gt 1) { [System.Windows.Automation.Condition[]]$conditions += New-Object System.Windows.Automation.OrCondition $current } elseif($current.Length -eq 1) { [System.Windows.Automation.Condition[]]$conditions += $current[0] } } } if($conditions.Length -gt 1) { [System.Windows.Automation.Condition]$condition = New-Object System.Windows.Automation.AndCondition $conditions } elseif($conditions) { [System.Windows.Automation.Condition]$condition = $conditions[0] } else { [System.Windows.Automation.Condition]$condition = [System.Windows.Automation.Condition]::TrueCondition } If($VerbosePreference -gt "SilentlyContinue") { function Write-Condition { param([Parameter(ValueFromPipeline=$true)]$condition, $indent = 0) process { Write-Debug ($Condition | fl * | Out-String) if($condition -is [System.Windows.Automation.AndCondition] -or $condition -is [System.Windows.Automation.OrCondition]) { Write-Verbose ((" "*$indent) + $Condition.GetType().Name ) $condition.GetConditions().GetEnumerator() | Write-Condition -Indent ($Indent+4) } elseif($condition -is [System.Windows.Automation.PropertyCondition]) { Write-Verbose ((" "*$indent) + $Condition.Property.ProgrammaticName + " = '" + $Condition.Value + "' (" + $Condition.Flags + ")") } else { Write-Verbose ((" "*$indent) + $Condition.GetType().Name + " where '" + $Condition.Value + "' (" + $Condition.Flags + ")") } } } Write-Verbose "CONDITIONS =============" $global:LastCondition = $condition foreach($c in $condition) { Write-Condition $c } Write-Verbose "============= CONDITIONS" } if($filters.Count -gt 0) { $Element = $Parent.FindAll( $search, $condition ) | Where-Object { $item = $_; foreach($f in $filters) { $item = $item | Where $f }; $item } } else { $Element = $Parent.FindAll( $search, $condition ) } } } Write-Verbose "Element Count: $(@($Element).Count)" if($Element) { foreach($el in $Element) { if($Bare) { Write-Output $el } else { $e = New-Object PSObject $el foreach($prop in $e.GetSupportedProperties() | Sort ProgrammaticName) { ## TODO: make sure all these show up: [System.Windows.Automation.AutomationElement] | gm -sta -type Property $propName = [System.Windows.Automation.Automation]::PropertyName($prop) Add-Member -InputObject $e -Type ScriptProperty -Name $propName -Value ([ScriptBlock]::Create( "`$this.GetCurrentPropertyValue( [System.Windows.Automation.AutomationProperty]::LookupById( $($prop.Id) ))" )) -EA 0 } foreach($patt in $e.GetSupportedPatterns()| Sort ProgrammaticName) { Add-Member -InputObject $e -Type ScriptProperty -Name ($patt.ProgrammaticName.Replace("PatternIdentifiers.Pattern","") + "Pattern") -Value ([ScriptBlock]::Create( "`$this.GetCurrentPattern( [System.Windows.Automation.AutomationPattern]::LookupById( '$($patt.Id)' ) )" )) -EA 0 } Write-Output $e } } } } } # [Cmdlet(VerbsCommon.Add, "UIAHandler")] # public class AddUIAHandlerCommand : PSCmdlet # { # private AutomationElement _parent = AutomationElement.RootElement; # private AutomationEvent _event = WindowPattern.WindowOpenedEvent; # private TreeScope _scope = TreeScope.Children; # # [Parameter(ValueFromPipeline = true)] # [Alias("Parent", "Element", "Root")] # public AutomationElement InputObject { set { _parent = value; } get { return _parent; } } # # [Parameter()] # public AutomationEvent Event { set { _event = value; } get { return _event; } } # # [Parameter()] # public AutomationEventHandler ScriptBlock { set; get; } # # [Parameter()] # public SwitchParameter Passthru { set; get; } # # [Parameter()] # public TreeScope Scope { set { _scope = value; } get { return _scope; } } # # protected override void ProcessRecord() # { # Automation.AddAutomationEventHandler(Event, InputObject, Scope, ScriptBlock); # # if (Passthru.ToBool()) # { # WriteObject(InputObject); # } # # base.ProcessRecord(); # } # } Export-ModuleMember -cmdlet * -Function * -Alias *
combined_dataset/train/non-malicious/Lab Manager Demo.ps1
Lab Manager Demo.ps1
# Demo showing how to connect to VMware Lab Manager. # Download LabManager.ps1 from http://www.poshcode.org/753. . .\\LabManager.ps1 # Run this command if your Lab Manager's certificate is untrusted but you # want to connect. Ignore-SslErrors # Connect to Lab Manager. $labManager = Connect-LabManager -server "demo.eng.vmware.com" ` -credential (get-credential) # Find out what operations there are. $labManager | gm | where { $_.MemberType -eq "Method" } # List all library configurations. $labManager.ListConfigurations(1) # Find all machines deployed from any library configuration. $labManager.ListConfigurations(1) | foreach { write-host ("For Configuration " + $_.id + ":") $labManager.ListMachines($_.id) } # See http://www.vmware.com/pdf/lm30_soap_api_guide.pdf for help on arguments.
combined_dataset/train/non-malicious/690.ps1
690.ps1
function Backup-RsEncryptionKey { [CmdletBinding(SupportsShouldProcess = $true, ConfirmImpact = 'Medium')] param ( [Parameter(Mandatory = $True)] [string] $Password, [Parameter(Mandatory = $True)] [string] $KeyPath, [Alias('SqlServerInstance')] [string] $ReportServerInstance, [Alias('SqlServerVersion')] [Microsoft.ReportingServicesTools.SqlServerVersion] $ReportServerVersion, [string] $ComputerName, [System.Management.Automation.PSCredential] $Credential ) if ($PSCmdlet.ShouldProcess((Get-ShouldProcessTargetWmi -BoundParameters $PSBoundParameters), "Retrieve encryption key and create backup in $KeyPath")) { $rsWmiObject = New-RsConfigurationSettingObjectHelper -BoundParameters $PSBoundParameters Write-Verbose "Retrieving encryption key..." $encryptionKeyResult = $rsWmiObject.BackupEncryptionKey($Password) if ($encryptionKeyResult.HRESULT -eq 0) { Write-Verbose "Retrieving encryption key... Success!" } else { throw "Failed to create backup of the encryption key. Errors: $($encryptionKeyResult.ExtendedErrors)" } try { Write-Verbose "Writing key to file..." [System.IO.File]::WriteAllBytes($KeyPath, $encryptionKeyResult.KeyFile) Write-Verbose "Writing key to file... Success!" } catch { throw } } }
combined_dataset/train/non-malicious/3949.ps1
3949.ps1
function Check-CmdletReturnType { param($cmdletName, $cmdletReturn) $cmdletData = Get-Command $cmdletName; Assert-NotNull $cmdletData; [array]$cmdletReturnTypes = $cmdletData.OutputType.Name | Foreach-Object { return ($_ -replace "Microsoft.Azure.Commands.Network.Models.","") }; [array]$cmdletReturnTypes = $cmdletReturnTypes | Foreach-Object { return ($_ -replace "System.","") }; $realReturnType = $cmdletReturn.GetType().Name -replace "Microsoft.Azure.Commands.Network.Models.",""; return $cmdletReturnTypes -contains $realReturnType; } function Test-RouteFilterCRUDMinimalParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $location = Get-ProviderLocation "Microsoft.Network/routeFilters"; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $vRouteFilter = New-AzRouteFilter -ResourceGroupName $rgname -Name $rname -Location $location; Assert-NotNull $vRouteFilter; Assert-True { Check-CmdletReturnType "New-AzRouteFilter" $vRouteFilter }; Assert-AreEqual $rname $vRouteFilter.Name; $vRouteFilter = Get-AzRouteFilter -ResourceGroupName $rgname -Name $rname; Assert-NotNull $vRouteFilter; Assert-True { Check-CmdletReturnType "Get-AzRouteFilter" $vRouteFilter }; Assert-AreEqual $rname $vRouteFilter.Name; $listRouteFilter = Get-AzRouteFilter -ResourceGroupName $rgname; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteFilter = Get-AzRouteFilter; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteFilter = Get-AzRouteFilter -ResourceGroupName "*"; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteFilter = Get-AzRouteFilter -Name "*"; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteFilter = Get-AzRouteFilter -ResourceGroupName "*" -Name "*"; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $removeRouteFilter = Remove-AzRouteFilter -ResourceGroupName $rgname -Name $rname -PassThru -Force; Assert-AreEqual $true $removeRouteFilter; Assert-ThrowsContains { Get-AzRouteFilter -ResourceGroupName $rgname -Name $rname } "not found"; } finally { Clean-ResourceGroup $rgname; } } function Test-RouteFilterCRUDAllParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $location = Get-ProviderLocation "Microsoft.Network/routeFilters"; $Tag = @{tag1='test'}; $TagSet = @{tag2='testSet'}; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $vRouteFilter = New-AzRouteFilter -ResourceGroupName $rgname -Name $rname -Location $location -Tag $Tag; Assert-NotNull $vRouteFilter; Assert-True { Check-CmdletReturnType "New-AzRouteFilter" $vRouteFilter }; Assert-AreEqual $rname $vRouteFilter.Name; Assert-AreEqualObjectProperties $Tag $vRouteFilter.Tag; $vRouteFilter = Get-AzRouteFilter -ResourceGroupName $rgname -Name $rname; Assert-NotNull $vRouteFilter; Assert-True { Check-CmdletReturnType "Get-AzRouteFilter" $vRouteFilter }; Assert-AreEqual $rname $vRouteFilter.Name; Assert-AreEqualObjectProperties $Tag $vRouteFilter.Tag; $listRouteFilter = Get-AzRouteFilter -ResourceGroupName $rgname; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteFilter = Get-AzRouteFilter; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteFilter = Get-AzRouteFilter -ResourceGroupName "*"; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteFilter = Get-AzRouteFilter -Name "*"; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteFilter = Get-AzRouteFilter -ResourceGroupName "*" -Name "*"; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $vRouteFilter.Tag = $TagSet; $vRouteFilter = Set-AzRouteFilter -RouteFilter $vRouteFilter -Force; Assert-NotNull $vRouteFilter; Assert-True { Check-CmdletReturnType "Set-AzRouteFilter" $vRouteFilter }; Assert-AreEqual $rname $vRouteFilter.Name; Assert-AreEqualObjectProperties $TagSet $vRouteFilter.Tag; $vRouteFilter = Get-AzRouteFilter -ResourceGroupName $rgname -Name $rname; Assert-NotNull $vRouteFilter; Assert-True { Check-CmdletReturnType "Get-AzRouteFilter" $vRouteFilter }; Assert-AreEqual $rname $vRouteFilter.Name; Assert-AreEqualObjectProperties $TagSet $vRouteFilter.Tag; $listRouteFilter = Get-AzRouteFilter -ResourceGroupName $rgname; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteFilter = Get-AzRouteFilter; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteFilter = Get-AzRouteFilter -ResourceGroupName "*"; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteFilter = Get-AzRouteFilter -Name "*"; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listRouteFilter = Get-AzRouteFilter -ResourceGroupName "*" -Name "*"; Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $removeRouteFilter = Remove-AzRouteFilter -ResourceGroupName $rgname -Name $rname -PassThru -Force; Assert-AreEqual $true $removeRouteFilter; Assert-ThrowsContains { Get-AzRouteFilter -ResourceGroupName $rgname -Name $rname } "not found"; } finally { Clean-ResourceGroup $rgname; } } function Test-RouteFilterRuleCRUDMinimalParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $rnameAdd = "${rname}Add"; $location = Get-ProviderLocation "Microsoft.Network/routeFilters"; $AccessSet = "Deny"; $RouteFilterRuleTypeSet = "Community"; $CommunityListSet = @("12076:5010","12076:5040"); $AccessAdd = "Allow"; $RouteFilterRuleTypeAdd = "Community"; $CommunityListAdd = @("12076:5040"); try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $vRouteFilter = New-AzRouteFilter -ResourceGroupName $rgname -Name $rname -Location $location; Assert-NotNull $vRouteFilter; $vRouteFilter = Add-AzRouteFilterRuleConfig -Name $rnameAdd -RouteFilter $vRouteFilter -Access $AccessAdd -RouteFilterRuleType $RouteFilterRuleTypeAdd -CommunityList $CommunityListAdd -Force; Assert-NotNull $vRouteFilter; $vRouteFilter = Set-AzRouteFilter -RouteFilter $vRouteFilter -Force; Assert-NotNull $vRouteFilter; $vRouteFilterRule = Get-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter -Name $rnameAdd; Assert-NotNull $vRouteFilterRule; Assert-True { Check-CmdletReturnType "Get-AzRouteFilterRuleConfig" $vRouteFilterRule }; Assert-AreEqual $rnameAdd $vRouteFilterRule.Name; Assert-AreEqual $AccessAdd $vRouteFilterRule.Access; Assert-AreEqualArray $CommunityListAdd $vRouteFilterRule.Communities; $listRouteFilterRule = Get-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter; Assert-NotNull ($listRouteFilterRule | Where-Object { $_.Name -eq $rnameAdd }); Assert-ThrowsContains { Add-AzRouteFilterRuleConfig -Name $rnameAdd -RouteFilter $vRouteFilter -Access $AccessAdd -RouteFilterRuleType $RouteFilterRuleTypeAdd -CommunityList $CommunityListAdd -Force } "already exists"; $vRouteFilter = Set-AzRouteFilterRuleConfig -Name $rnameAdd -RouteFilter $vRouteFilter -Access $AccessSet -RouteFilterRuleType $RouteFilterRuleTypeSet -CommunityList $CommunityListSet -Force; Assert-NotNull $vRouteFilter; $vRouteFilter = Set-AzRouteFilter -RouteFilter $vRouteFilter -Force; Assert-NotNull $vRouteFilter; $vRouteFilterRule = Get-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter -Name $rnameAdd; Assert-NotNull $vRouteFilterRule; Assert-True { Check-CmdletReturnType "Get-AzRouteFilterRuleConfig" $vRouteFilterRule }; Assert-AreEqual $rnameAdd $vRouteFilterRule.Name; Assert-AreEqual $AccessSet $vRouteFilterRule.Access; Assert-AreEqualArray $CommunityListSet $vRouteFilterRule.Communities; $listRouteFilterRule = Get-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter; Assert-NotNull ($listRouteFilterRule | Where-Object { $_.Name -eq $rnameAdd }); $vRouteFilter = Remove-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter -Name $rnameAdd -Force; $vRouteFilter = Remove-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter -Name $rname -Force; $vRouteFilter = Remove-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter -Name $rname -Force; $vRouteFilter = Set-AzRouteFilter -RouteFilter $vRouteFilter -Force; Assert-NotNull $vRouteFilter; Assert-ThrowsContains { Get-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter -Name $rnameAdd } "Sequence contains no matching element"; Assert-ThrowsContains { Set-AzRouteFilterRuleConfig -Name $rnameAdd -RouteFilter $vRouteFilter -Access $AccessSet -RouteFilterRuleType $RouteFilterRuleTypeSet -CommunityList $CommunityListSet -Force } "does not exist"; } finally { Clean-ResourceGroup $rgname; } }
combined_dataset/train/non-malicious/sample_50_94.ps1
sample_50_94.ps1
# Instructions: select the entire file and hit F8 to # load the extensions. To see the list of registered # extensions and run them, hit Ctrl+Shift+P, type 'addi' # and run the "Show additional commands from PowerShell modules" # command. A quick pick list will appear with all 3 # extensions registered. Selecting one of them will launch it. function Invoke-MyCommand { Write-Output "My command's function was executed!" } # Registering a command for an existing function Register-EditorCommand -Verbose ` -Name "MyModule.MyCommandWithFunction" ` -DisplayName "My command with function" ` -Function Invoke-MyCommand # Registering a command to run a ScriptBlock Register-EditorCommand -Verbose ` -Name "MyModule.MyCommandWithScriptBlock" ` -DisplayName "My command with script block" ` -ScriptBlock { Write-Output "My command's script block was executed!" } # A real command example: function Invoke-MyEdit([Microsoft.PowerShell.EditorServices.Extensions.EditorContext]$context) { # Insert text at pre-defined position $context.CurrentFile.InsertText( "`r`n# I was inserted by PowerShell code!`r`nGet-Process -Name chrome`r`n", 35, 1); # TRY THIS ALSO, comment out the above 4 lines and uncomment the below # # Insert text at cursor position # $context.CurrentFile.InsertText( # "Get-Process -Name chrome", # $context.CursorPosition); } # After registering this command, you only need to re-evaluate the # Invoke-MyEdit command when you've made changes to its code. The # registration of the command persists. Register-EditorCommand -Verbose ` -Name "MyModule.MyEditCommand" ` -DisplayName "Apply my edit!" ` -Function Invoke-MyEdit ` -SuppressOutput # SIG # Begin signature block # MIIr5AYJKoZIhvcNAQcCoIIr1TCCK9ECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCKCVuBpz/9fSz2 # LkJkxdMUtP5fMDok/d1ZAAsMYDBC16CCEW4wggh+MIIHZqADAgECAhM2AAAB33OB # lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH # QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe # Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv # c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK # AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0 # wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U # bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD # uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U # 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ # 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE # HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm # KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2 # BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu # YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy # MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv # QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS # BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx # LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG # aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO # PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy # dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM # P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0 # aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E # BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB # 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM # L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv # Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n # YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt # ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0 # LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v # L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ # LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp # Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0 # P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw # FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI # KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs # jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU # HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr # 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo # VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5 # 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo # MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx # EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV # BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw # EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD # EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ # mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY # /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM # H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO # LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH # K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia # piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC # MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU # llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG # AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3 # CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL # KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK # KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG # AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ # KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI # MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV # HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j # cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu # Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6 # Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl # MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE # Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz # PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr # BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz # L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt # ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6 # Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH # MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw # gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs # aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u # LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl # cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf # XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK # QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp # fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO # ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2 # cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6 # 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS # jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm # PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK # yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn # BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry # fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzDCCGcgCAQEwWDBBMRMwEQYKCZIm # iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg # Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w # GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG # AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIB03zVg1EZOFP9qimPsOXecJBmmRa+ue # o6iDn29NyPTGMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA # dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA # vLabdK3Ngn6j8gC3+2GSQ4XVPp+iylF8Ik91hQnOyHXob2xwubQme7oqBYcuYLQ+ # fdRcecNWiXAIWU7oRFK5H2JDxqvo+8SL+hLJFxqF3OKosGHB/HsABc32mYUR7yHU # 0rspK2Vf89PkVHEEF1GOomBxd64cCTYfugGhAYghnjTp0zP6/APpKWZCK5do3hOm # JfAbjk+ZMVZG6aG+VuLz3j11Bnxxe3baDK7kT+7VuCG/0mYQ6gMbdn8XkmjjbzmX # h+xeM3zOj4tFt3ZeBZdbyUoh08+Sr53GvqdRj4/AaOAdcJsZ5o4hPge3R7qOt8uF # 8R2fqrPnFqwMdm/Ms/kXk6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqG # SIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B # CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA # BCB04tT+ryqpT0PkjNiZsLcsG5fZeMua9SaAGmUbUEp36AIGZfLh38qNGBMyMDI0 # MDQwMzIyNTgxNi41ODNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP # cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5 # NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIH # IDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0BAQsFADB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1MzhaFw0y # NTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD # VQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC # DwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK/ItP80cn # +8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4VyHEco/u1 # QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+H77gL4r0 # 1TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3SEZAq4XI # jiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5QpS4f6/M # sXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5hPP6HVRoq # BYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZae77homzx # 6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU0NLEFNCe # tluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQYA2Xaz1fK # 9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu974e9mGW # 7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6XdyeQIDAQAB # o4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8GA1UdIwQY # MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt # U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB # BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj # cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB # /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G # CSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0UY3FjvPh # wGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4ybknuopkl # beGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv+y1AXJ5Q # cLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8bA6839w11 # 9b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0jeOv5dUG # MCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo17SnM/gH # VSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJlhPTOQ3KO # EZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIautsH7SHO # iOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtBSY4oVRse # dSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRua3K0xivd # tnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iBHKQjec6V # NzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL # BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV # BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X # DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR # BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM # 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm # 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB # RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb # fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO # Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw # XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW # /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w # EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK # Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2 # BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH # CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB # BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v # BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM # KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF # BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW # BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH # AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp # L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF # AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx # Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ # iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2 # pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw # C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7 # T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO # Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL # mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L # wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5 # m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE # 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIB # ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE # CxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy # b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCOHPtgVdz9 # EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwMA0GCSqGSIb3DQEBCwUAAgUA6be7PjAiGA8yMDI0MDQwMzExMjU1MFoYDzIw # MjQwNDA0MTEyNTUwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpt7s+AgEAMAcC # AQACAgCFMAcCAQACAhPwMAoCBQDpuQy+AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG # CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL # BQADggEBAGOEGg2aN3xyURELmw+L+GX8p2GLWI15sn26L5zZ1RCMYvrrEPzbIkBT # j1NL0yFvaXLZb68bd179ylRdRB49JdGqFq0JlXlDpduzp+W9aX4OsZcimqvnX/aV # v8vpwR0bkwQiF36Wlw3TXbw2aZdv/KnRY/COKkaoKxQxC9rgkNw5MLAx+GJfJFYx # lMwxRj+jQkox5WIar2zQ+etv9rPjBrUmC2eDaY7gc8q8+3N/aVk/bE/j6LWpX5d5 # zJSjmZLTCPvHFakF75DP7NBXDK6u3RQgxwqvcQBdP3SXpw0P72aW5NEI3EAbdjiL # caVi+qcCb/mHcVEsE/IQWfbRiTzLslgxggQNMIIECQIBATCBkzB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DANBglghkgB # ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3 # DQEJBDEiBCDNCWGCzfIrA9N+zcL27cwrudw3OcTleAwfuoLHeAm1QzCB+gYLKoZI # hvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQIXaoMWUL # ejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA # AAHs4CukgtCRUoAAAQAAAewwIgQgKz3kSreOLui1ENgzHV9zHDupRYY2KLepgApY # ryRPCEkwDQYJKoZIhvcNAQELBQAEggIACGwAAWohkjXDa4Bk5l94d/ydvTbRzZAL # mKtXmzmTYuMNNKdgr4Rqb1cx7IdZONqr5X/QCoeZXuIM7/HJPvpY2PhIht1PFaL5 # eV9K9LUslCqk7T1s5zqlnvwgsn20UBTMFTHMFXYmP3pSuo8aWcFAyteLAlaBV5V4 # ImA5bburJPlJC7DbMpMGaSOWBvZFUgek+mJZu44XfUC9K/HKLPwPhoKXZ3hCuzfX # ZWctgwtkjZ6J1qGM3o3QUb38hBduvqTuje56HppoKQxHZ+gN0l30uwhMWGWDgxLO # 0DhSXaqxm/Eu49S8DY2F8jRbW1WOzW0LveCbeUzdd5MJ1ftClmnQdwELWPtKDkkP # MpmMg2l5rGPIErntb4ObeRk1Q4EEnOvk8jVSwsD4Wi6+ThbNoyNwJrxDdUC3e252 # oVG8n3/cqgKb9FhH1+PiuTcgaXVIPCueAJP+7185C2kWAANzKr+cBUVCNnKDEvRw # FB1sISxojAbc8ioUnmXgSe0N+rLCM29x+PqKMSmIxJtKtv8761hTMBrWFssmkn+l # SJQt2fTUJcjdtXtRdHaKwMsgdcicfXdrqExm9FZ2s9WDmRHUJpSAV9zFrKn88M4g # x2yjnmiiszntlwOD5T4urblxzorRN3agJQumDh09qUXEqQqRRmgO3dsNusjJLt+L # 3ajyFGHGK3Q= # SIG # End signature block
combined_dataset/train/non-malicious/221.ps1
221.ps1
function Get-SCSMWorkItemParent { [CmdletBinding()] PARAM ( [Parameter(ParameterSetName = 'GUID', Mandatory)] [Alias('ID')] $WorkItemGUID, [Parameter(ParameterSetName = 'Object', Mandatory)] $WorkItemObject ) BEGIN { IF (-not (Get-Module -Name Smlets)) { TRY { Import-Module -Name smlets -ErrorAction Stop } CATCH { Write-Error -Message "[BEGIN] Error importing smlets" $Error[0].Exception.Message } } ELSE {Write-Verbose -Message "[BEGIN] Smlets module already loaded"} } PROCESS { TRY { IF ($PSBoundParameters['WorkItemGUID']) { Write-Verbose -Message "[PROCESS] Retrieving WorkItem with GUID" $ActivityObject = Get-SCSMObject -id $WorkItemGUID } IF ($PSBoundParameters['WorkItemObject']) { Write-Verbose -Message "[PROCESS] Retrieving WorkItem with SM Object" $ActivityObject = Get-SCSMObject -id $WorkItemObject.get_id() } Write-Verbose -Message "[PROCESS] Activity: $($ActivityObject.name)" Write-Verbose -Message "[PROCESS] Retrieving WorkItem Parent" $ParentRelationshipID = '2da498be-0485-b2b2-d520-6ebd1698e61b' $ParentRelatedObject = Get-SCSMRelationshipObject -ByTarget $ActivityObject | Where-Object{ $_.RelationshipId -eq $ParentRelationshipID } $ParentObject = $ParentRelatedObject.SourceObject Write-Verbose -Message "[PROCESS] Activity: $($ActivityObject.name) - Parent: $($ParentObject.name)" If ($ParentObject.ClassName -eq 'System.WorkItem.ServiceRequest' -OR $ParentObject.ClassName -eq 'System.WorkItem.ChangeRequest' -OR $ParentObject.ClassName -eq 'System.WorkItem.ReleaseRecord' -OR $ParentObject.ClassName -eq 'System.WorkItem.Incident') { Write-Verbose -Message "[PROCESS] This is the top level parent" Write-Output $ParentObject } Else { Write-Verbose -Message "[PROCESS] Not the top level parent. Running Get-SCSMWorkItemParent against this object" Get-SCSMWorkItemParent -WorkItemGUID $ParentObject.id.guid } } CATCH { Write-Error -Message $Error[0].Exception.Message } } END { remove-module -Name smlets -ErrorAction SilentlyContinue } }
combined_dataset/train/non-malicious/sample_25_27.ps1
sample_25_27.ps1
Get-Module | ForEach-Object { Remove-Module -Name $_.Name -Force } $PSModuleAutoloadingPreference = 'none' Import-Module Microsoft.PowerShell.Utility #Enforcing default PSModulePath to avoid getting unexpected modules to run instead of built-in modules $env:PSModulePath = "C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules" $resultOutputDir = "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDEClientAnalyzerResult" function CheckAuthenticodeSignature($pathToCheck) { if (test-path $resultOutputDir -ErrorAction SilentlyContinue) { $issuerInfo = "$resultOutputDir\issuerInfo.txt" } else { $issuerInfo = "$PSScriptRoot\issuerInfo.txt" } if ($pathToCheck) { if (Test-Path -path $pathToCheck -ErrorAction SilentlyContinue) { $AuthenticodeSig = (Get-AuthenticodeSignature -FilePath $pathToCheck) $cert = $AuthenticodeSig.SignerCertificate $FileInfo = (get-command $pathToCheck).FileVersionInfo $issuer = $cert.Issuer #OS is older than 2016 and some built-in processes will not be signed if (($OSBuild -lt 14393) -and (!$AuthenticodeSig.SignerCertificate)) { if (($FileInfo.CompanyName -eq "Microsoft Corporation")) { return } else { Write-Error "Script execution terminated because a process or script that does not have any signature was detected" | Out-File $issuerInfo -append $pathToCheck | Out-File $issuerInfo -append $AuthenticodeSig | Format-List * | Out-File $issuerInfo -append $cert | Format-List * | Out-File $issuerInfo -append [Environment]::Exit(1) } } #check if valid if ($AuthenticodeSig.Status -ne "Valid") { Write-Error "Script execution terminated because a process or script that does not have a valid Signature was detected" | Out-File $issuerInfo -append $pathToCheck | Out-File $issuerInfo -append $AuthenticodeSig | Format-List * | Out-File $issuerInfo -append $cert | Format-List * | Out-File $issuerInfo -append [Environment]::Exit(1) } #check issuer if (($issuer -ne "CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Development PCA 2014, O=Microsoft Corporation, L=Redmond, S=Washington, C=US")) { Write-Error "Script execution terminated because a process or script that is not Microsoft signed was detected" | Out-File $issuerInfo -append $pathToCheck | Out-File $issuerInfo -append $AuthenticodeSig | Format-List * | Out-File $issuerInfo -append $cert | Format-List * | Out-File $issuerInfo -append [Environment]::Exit(1) } if ($AuthenticodeSig.IsOSBinary -ne "True") { #If revocation is offline then test below will fail if (!$LegacyOS) { $IsOnline = (Get-NetConnectionProfile).IPv4Connectivity -like "*Internet*" } $EKUArray = @('1.3.6.1.5.5.7.3.3', '1.3.6.1.4.1.311.76.47.1') if ($IsOnline) { $IsWindowsSystemComponent = (Test-Certificate -Cert $cert -EKU "1.3.6.1.4.1.311.10.3.6" -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable OsCertWarnVar -ErrorVariable OsCertErrVar) $IsMicrosoftPublisher = (Test-Certificate -Cert $cert -EKU "1.3.6.1.4.1.311.76.8.1" -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable MsPublisherWarnVar -ErrorVariable MsPublisherErrVar) $TrustedEKU = (Test-Certificate -Cert $cert -EKU $EKUArray -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable EKUWarnVar -ErrorVariable EKUErrVar) if (($IsWindowsSystemComponent -eq $False) -and ($IsMicrosoftPublisher -eq $False) -and ($TrustedEKU -eq $False)) { #Defender AV and some OS processes will have an old signature if older version is installed #Ignore if cert is OK and only signature is old if (($OsCertWarnVar -like "*CERT_TRUST_IS_NOT_TIME_VALID*") -or ($MsPublisherWarnVar -like "*CERT_TRUST_IS_NOT_TIME_VALID*") -or ($OsCertWarnVar -like "*CERT_TRUST_IS_OFFLINE_REVOCATION*") -or ($MsPublisherWarnVar -like "CERT_TRUST_IS_OFFLINE_REVOCATION")) { return } Write-Error "Script execution terminated because the process or script certificate failed trust check" | Out-File $issuerInfo -append $pathToCheck | Out-File $issuerInfo -append $AuthenticodeSig | Format-List * | Out-File $issuerInfo -append $cert | Format-List * | Out-File $issuerInfo -append [Environment]::Exit(1) } } } } else { Write-Error ("Path " + $pathToCheck + " was not found") | Out-File $issuerInfo -append } } } function Download-WebFile($ClientAnalyzer) { Write-host -ForegroundColor Green "Downloading MDEClientAnalyzer from: " $ClientAnalyzer Import-Module BitsTransfer $BitsJob = Start-BitsTransfer -source $ClientAnalyzer -Destination "$DlZipFile" -Description "Downloading additional files" -RetryTimeout 60 -RetryInterval 60 -ErrorAction SilentlyContinue } [int]$OSBuild = [system.environment]::OSVersion.Version.Build if ($OSBuild -le "7601") { $LegacyOS = "True" } $DownloadDir = "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads" $DlZipFile = Join-Path $DownloadDir "MDEClientAnalyzerPreview.zip" $MDECADir = Join-Path $DownloadDir "MDECA" CheckAuthenticodeSignature $MyInvocation.MyCommand.Path if (!(test-path -path "$DlZipFile")) { Download-WebFile "https://aka.ms/betamdeanalyzer" } if (test-path -path "$DlZipFile") { if (Test-Path -LiteralPath $MDECADir -PathType Container) { Remove-Item -LiteralPath $MDECADir -Recurse -Force -ErrorAction SilentlyContinue } [System.Reflection.Assembly]::LoadWithPartialName("system.IO.Compression.FileSystem") | Out-Null [System.IO.Compression.ZipFile]::ExtractToDirectory($DlZipFile, $MDECADir) | Out-Null CheckAuthenticodeSignature "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzer.ps1" &powershell -ExecutionPolicy Bypass "& 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzer.ps1' -outputDir 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA' -r -l -m 1" } # SIG # Begin signature block # MIIn4AYJKoZIhvcNAQcCoIIn0TCCJ80CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA3nJhXJGgP85p+ # OmbJH5rke7yGsf4fz/Egp/q9wQG2xKCCDZcwggYVMIID/aADAgECAhMzAAADz7d0 # vUQxddCTAAAAAAPPMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwMjIyMTkwNzUzWhcNMjUwMjE5MTkwNzUzWjCBlDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjE+MDwGA1UEAxM1TWlj # cm9zb2Z0IFdpbmRvd3MgRGVmZW5kZXIgQWR2YW5jZWQgVGhyZWF0IFByb3RlY3Rp # b24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDwAPmxMmR9a92NX/Lv # 2PmaySDZqZUANxu28n+GqAuhMRrC8/v5HrKeebKt+6wqnp28fO1jvJ5OlBIrirN7 # KUiSUH86mvByCFnIwIkKcusZbgEF+v15S0jRExa5C9lC+kDVYtlSCnPEdx/tkKLN # QQMmSroC3baj7y0WIvBfZ1l4x2qyDhFC/5plmMfD8TSfl3sN4twBiXAcpJ/SES50 # QbLahl/MTsVA2UEo7ygPJIrmci8wvD0Kt1pfkwbB3eiK4Vatr0VoJujRucjGT322 # m/9vH6p4Y5suUJMo9196/ze8hA8bqH+5NdU+DeRLrV/UzVat1Xs/Wm6kPK8GgTPL # H+M9AgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBggrBgEFBQcDAwYKKwYBBAGCN0wv # ATAdBgNVHQ4EFgQU10vjUl0bvgJvpCFtGT8ECb23+CAwRQYDVR0RBD4wPKQ6MDgx # HjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMNNDUxODk0 # KzUwMjA2OTAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8E # TTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9N # aWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBR # BggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAw # DQYJKoZIhvcNAQELBQADggIBAHcmfqgz/boPmZhEOAtYI5wj3mRicbSQwDQcGZfK # 8I1WdILE80dhNGqgtVvxO5v5/PyjBJY5HV9HxxCzdVVj60PYAwzoyfTIZF+0hPrh # l6JkjfckCiy9qsONVkL6SDJH6a+Xf4penA2ge9WM3XLR5BUQH538wx4w+VswV1QX # hKsAMGAvxBG8EzIFTMRXMoKy/RYZ1FSig96mdJRb9Zh4o37XcyAgSxlbiv50vu3X # MGNXRZJY0/PdB6Du55mI0WfJDaKBJuDShBMLOjDRX8UEWjy3rqGTjVVLYhK4mWq6 # I/1bIZlgkKBFnUMFbVvtSWDP13FgyGIVDk5YB5s2XmSC6hTfXAHakSpLfFeZ1VK5 # /pRMdhxEenleDdsgksd9idt+U7YxgjZ6gfdGuWgj9ZNi8Ef4ILoA5fkUGIIP14a7 # j2SUsaYvJKw/5aiVHRza+Q9gbDpNcsR5WbhhcSAnkFmi7ZkmJKHVlkUqAUDbP8WB # yz/bq6m/HCHELfFfsG4HMvOfLSTVhKfXPptRzN4N5m2AZX423KM2zhqzPjCWNWce # /jqhUKtbyMuPPqqo+eaoYi+ZzaEqirxAmPF6Nz3VIncZppzm451L2Uu05NwN1T5m # ZbiGW2WW1Iz50ofUKACCqThHMtSh4fOdq0OiKaqQz3S5BGdoXdPPOKgXxOtfaMpr # C3SrMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWlj # cm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4 # MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBD # QSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3Y # bqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUB # FDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnbo # MlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT # +OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuy # e4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEh # NSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2 # z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3 # s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78Ic # V9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E # 11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5P # M4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcV # AQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3 # FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf # BgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBL # hklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS # b29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggr # BgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsG # AQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwA # ZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0G # CSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDB # ZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc # 8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYq # wooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu # 5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWI # UUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXh # j38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yH # PgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtI # EJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4Guzq # N5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgR # MiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQ # zTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEC # EzMAAAPPt3S9RDF10JMAAAAAA88wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcN # AQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUw # LwYJKoZIhvcNAQkEMSIEIGV7NBTufEUl5Ru9UIwKnoHjV3qRHoKO+4j4bZaGGHV+ # MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEArnigk1ZK5oNv # EeXKK4NMSvGcWqO7aPrZgPj1EuqyJgM/y48h2Ev8OPBHJn0A90BSsFdFAewf2kEi # rypl6hYzT7V/5bh3QqJTnQ/boMYefrl6whwGLm+IordBgXkOw69Bbc8QTVAjpbH+ # YrS2bw+9jsHS175LMzq8Lsbpb+aPhZeW1AOQ367GOzJ9HXfvLVeQAenAEZyIlR4R # m3D9gADqFBAZk0HY3kfFjboZJgkFjAum/dBL4fMbef5OZhs08EjxHkmjeIJ//Rwj # j2wSQmi1DjMW1LvmWQUOKOuYy1Z4msyh16j+VNsZmvyOrwtPziRLKi/nctVX9D9v # i6Xy6tK4tKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCC # FwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgE # ggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBHbWzexa2x # lwQXmKcEmvbvOHOJ/y0efKt3MT0h6XsLaQIGZjOpdOv6GBMyMDI0MDUxMjExMDcz # NS45ODZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25z # IExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjhENDEtNEJGNy1CM0I3 # MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycw # ggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJKoZIhvcNAQELBQAwfDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj # cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzI5WhcNMjUw # MTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVk # MSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJpXggzBeNG5KB8M9AbIWe # EokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqmscQu36/8h2bx6TU4M8dV # ZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPFUijTA7zV7Y5PRYrS4FL9 # p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdrc1GRNEk2F91L3pxR+32F # suQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T7XC1L0PRyKy9MZ6TBWru # 2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8JIvUH0cbvyWM8PomhFi6q # 2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdzz4RVTo8cFRMdQCxlKkSn # ocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0UNnCRv7UDxlSGiwiGkmny # 53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5Oap54fGeGYU8KxOohmz60 # 4BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2UIQKWU7lv7chrBrHCDw0 # jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx/66hzqgjSTOEY3pu46BF # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41FbehZ8Y+ep2m2YiYqQMwHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t70a8Y2hGxj6siDSulGAs # 4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0GLkEsUWTGF2tP6WsDdl5 # /lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6vAIPOkZAYihBH/RXcxzb # iliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKudPWuBGz/qdRlJtOl5nv9 # NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnYnJjjsCxv+yJzao2aUHiI # QzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ3b3zSWTMmFWunFr2aLk6 # vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z6k7AnETc28dAvLf/ioqU # rVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCECV68611jriajfdVg8o0Wp # +FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymHBzsIMU0yMmuVmAkYxbdE # Di5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCfv/tVhJtz5wgiEIKX+s4a # kawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXvE6OZMjI/V1AgSAg8U/he # MWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQw # ggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBM # aW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzEl # MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsO # AwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCkfjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOnqrUgwIhgPMjAyNDA1 # MTIxMDUxNTJaGA8yMDI0MDUxMzEwNTE1MlowdDA6BgorBgEEAYRZCgQBMSwwKjAK # AgUA6eqtSAIBADAHAgEAAgIaRzAHAgEAAgIRlTAKAgUA6ev+yAIBADA2BgorBgEE # AYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYag # MA0GCSqGSIb3DQEBBQUAA4GBAJoUb9BVoeUB8yxqNHf6CZJPKGtAmsvJZOyWh75c # tT/LeVZLu0LIn4UAtFw6SBNFvkNTffHIFtaRrGT8Rjo+5UoS3SkyRJBPViWXIxjz # vQrRA+y2yo7wCrO0PollTLwMvUW0lucnQWCE8GgkpAI9DILxdC7raE03e6ThAl9f # owdVMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC # EzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3 # DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgc+/g3O2iq8B25ife # rWdfFVxzb109yIz0U0kbQDDrGrUwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9 # BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xyMuYmKjCBmDCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9m5ocaIMiAAEAAAHjMCIE # IPXdjtHIt5Eymq/iyJBvTL9wg4f2puij54jMtpXRjDDLMA0GCSqGSIb3DQEBCwUA # BIICAGQMmh9y0ENxKOfDESiRlJ2jmf0fDj0cZhKi+ZQjs2nY4yUpCUoovLy6BUyx # N2yhEqC8J488YLdygHFcSVmT+PdmOJ176X3/Wha1xLsZGuNShWRoV2qWn+ZmCaYd # p6fZZusxvbF//k/N1mU6m+BaC1K/QNSw4aldfg6lZsE1NQOX1jKqmi94evej2tLh # GlN/wcj8QqcsFyGbwEw78VZrUgRoxQrKb0MmZo3kQsJZfCcksGEIUjgAdNPdbnOV # 8DJL2pFtNU5RA8cIEAhIMMoIcbFNgN36v8b4vBtHY3WCJgvaVLGosz50Wh1MBO60 # 8cVYWbgmfy7WxW1WKYVGHWfQW/MiCIgRVNNm3fhjTkyzB4dX8Kf6vAscsSZ+U/6c # emis5CFml/ipzDe1o1tKdsquRXUrEsJEbE83hHncxVQgFRb34RXAtn6mqvZgsO8V # O8lAK97X8qkyUpyHsClsIqqYlE6n7NnpoxSQtuuyBahgA2y0oEKO7o19JiS/94fe # BP4LTtrqguAfEKOB/wfFhjEIQA+DT6n9rLrJqy7xw0TygipKO0/6hkWSeJXL5wHr # HEOj10FYLROigDz/5UetRa6kliDJlQyny9ZEciyiVPDTU1SgY2U2uSLgmztWKCR9 # rLEVnuMDL+r/4+GjNmcnzSr1EOkBJiFa8HDOj7/dVtr/puJn # SIG # End signature block
combined_dataset/train/non-malicious/2733.ps1
2733.ps1
[CmdletBinding()] Param ( [Parameter(Mandatory=$false)] [switch]$AllEvents ) if ($AllEvents) { Write-Warning "Running this script in 'AllEvents' mode is not recommended as it returns a significant amount of unnecessary data." Start-Sleep -Seconds 1 Get-WinEvent -LogName "Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational" | ` Select-Object -Property TimeCreated, LogName, Id, Version, ProcessId, ThreadId, MachineName, UserId, Message } else { $RawEvents = Get-WinEvent -LogName "Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational" | ` Where-Object { $_.Id -eq 1149 } $RawEvents | ForEach-Object ` { if ($_.Properties.Count -lt 3) { Write-Warning "Event record missing expected fields. Skipping extended processing." $_ | Select-Object -Property TimeCreated, LogName, Id, Version, ProcessId, ThreadId, MachineName, UserId continue } $User = $_.Properties[0].Value $Domain = $_.Properties[1].Value $SourceIp = $_.Properties[2].Value $NormalizedUser = ("{1}\{0}" -f $User, $Domain) $Message = $_.Message.Split("`n")[0] $PropertyBag = @{ TimeCreated = $_.TimeCreated; LogName = $_.LogName; Id = $_.Id; Version = $_.Version; ProcessId = $_.ProcessId; ThreadId = $_.ThreadId; MachineNae = $_.MachineName; UserId = $_.UserId; UserName = $NormalizedUser; SourceIp = $SourceIp; Message = $Message } $o = New-Object -TypeName PSCustomObject -Property $PropertyBag $o } }
combined_dataset/train/non-malicious/961.ps1
961.ps1
$rgName='MyResourceGroup' $location='eastus' $cred = Get-Credential -Message 'Enter a username and password for the virtual machine.' New-AzResourceGroup -Name $rgName -Location $location $fesubnet = New-AzVirtualNetworkSubnetConfig -Name 'MySubnet-FrontEnd' -AddressPrefix '10.0.1.0/24' $besubnet = New-AzVirtualNetworkSubnetConfig -Name 'MySubnet-BackEnd' -AddressPrefix '10.0.2.0/24' $vnet = New-AzVirtualNetwork -ResourceGroupName $rgName -Name 'MyVnet' -AddressPrefix '10.0.0.0/16' ` -Location $location -Subnet $fesubnet, $besubnet $rule1 = New-AzNetworkSecurityRuleConfig -Name 'Allow-HTTP-ALL' -Description 'Allow HTTP' ` -Access Allow -Protocol Tcp -Direction Inbound -Priority 100 ` -SourceAddressPrefix Internet -SourcePortRange * ` -DestinationAddressPrefix * -DestinationPortRange 80 $rule2 = New-AzNetworkSecurityRuleConfig -Name 'Allow-HTTPS-All' -Description 'Allow HTTPS' ` -Access Allow -Protocol Tcp -Direction Inbound -Priority 200 ` -SourceAddressPrefix Internet -SourcePortRange * ` -DestinationAddressPrefix * -DestinationPortRange 443 $rule3 = New-AzNetworkSecurityRuleConfig -Name 'Allow-RDP-All' -Description 'Allow RDP' ` -Access Allow -Protocol Tcp -Direction Inbound -Priority 300 ` -SourceAddressPrefix Internet -SourcePortRange * ` -DestinationAddressPrefix * -DestinationPortRange 3389 $nsg = New-AzNetworkSecurityGroup -ResourceGroupName $RgName -Location $location ` -Name "MyNsg-FrontEnd" -SecurityRules $rule1,$rule2,$rule3 Set-AzVirtualNetworkSubnetConfig -VirtualNetwork $vnet -Name 'MySubnet-FrontEnd' ` -AddressPrefix 10.0.1.0/24 -NetworkSecurityGroup $nsg $rule1 = New-AzNetworkSecurityRuleConfig -Name 'Deny-Internet-All' -Description "Deny all Internet" ` -Access Allow -Protocol Tcp -Direction Outbound -Priority 100 ` -SourceAddressPrefix * -SourcePortRange * ` -DestinationAddressPrefix Internet -DestinationPortRange * $nsg = New-AzNetworkSecurityGroup -ResourceGroupName $RgName -Location $location ` -Name "MyNsg-BackEnd" -SecurityRules $rule1 Set-AzVirtualNetworkSubnetConfig -VirtualNetwork $vnet -Name 'MySubnet-backEnd' ` -AddressPrefix 10.0.2.0/24 -NetworkSecurityGroup $nsg $publicipvm = New-AzPublicIpAddress -ResourceGroupName $rgName -Name 'MyPublicIp-FrontEnd' ` -location $location -AllocationMethod Dynamic $nicVMfe = New-AzNetworkInterface -ResourceGroupName $rgName -Location $location ` -Name MyNic-FrontEnd -PublicIpAddress $publicipvm -Subnet $vnet.Subnets[0] $nicVMbe = New-AzNetworkInterface -ResourceGroupName $rgName -Location $location ` -Name MyNic-BackEnd -Subnet $vnet.Subnets[1] $vmConfig = New-AzVMConfig -VMName 'myVM' -VMSize Standard_DS2 | ` Set-AzVMOperatingSystem -Windows -ComputerName 'myVM' -Credential $cred | ` Set-AzVMSourceImage -PublisherName 'MicrosoftWindowsServer' -Offer 'WindowsServer' ` -Skus '2016-Datacenter' -Version 'latest' $vmconfig = Add-AzVMNetworkInterface -VM $vmConfig -id $nicVMfe.Id -Primary $vmconfig = Add-AzVMNetworkInterface -VM $vmConfig -id $nicVMbe.Id $vm = New-AzVM -ResourceGroupName $rgName -Location $location -VM $vmConfig
combined_dataset/train/non-malicious/1422.ps1
1422.ps1
function Install-CMsi { [CmdletBinding(SupportsShouldProcess=$true)] param( [Parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [Alias('FullName')] [string[]] $Path, [Parameter(DontShow=$true)] [Switch] $Quiet, [Switch] $Force ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( $PSBoundParameters.ContainsKey( 'Quiet' ) ) { Write-Warning ('Install-CMsi''s `Quiet` switch is obsolete and will be removed in a future major version of Carbon. Installers are run in quiet mode by default. Please remove usages of the `Quiet` switch.') } Get-CMsi -Path $Path | Where-Object { if( $Force ) { return $true } $installInfo = Get-CProgramInstallInfo -Name $_.ProductName -ErrorAction Ignore if( -not $installInfo ) { return $true } $result = ($installInfo.ProductCode -ne $_.ProductCode) if( -not $result ) { Write-Verbose -Message ('[MSI] [{0}] Installed {1}.' -f $installInfo.DisplayName,$installInfo.InstallDate) } return $result } | ForEach-Object { $msi = $_ if( $PSCmdlet.ShouldProcess( $msi.Path, "install" ) ) { Write-Verbose -Message ('[MSI] [{0}] Installing from {1}.' -f $msi.ProductName,$msi.Path) $msiProcess = Start-Process -FilePath "msiexec.exe" -ArgumentList "/quiet","/i",('"{0}"' -f $msi.Path) -NoNewWindow -Wait -PassThru if( $msiProcess.ExitCode -ne $null -and $msiProcess.ExitCode -ne 0 ) { Write-Error ("{0} {1} installation failed. (Exit code: {2}; MSI: {3})" -f $msi.ProductName,$msi.ProductVersion,$msiProcess.ExitCode,$msi.Path) } } } } Set-Alias -Name 'Invoke-WindowsInstaller' -Value 'Install-CMsi'
combined_dataset/train/non-malicious/sample_65_88.ps1
sample_65_88.ps1
]Ограничението PrintAllTranslations не може да се използва с ограничението IgnoreTranslations.†Не можете да добавите изчислената колона „%{oii_column/}“ към хибридната таблица „%{oii_table/}“. Моля, премахнете изчислената колона.•Не можете да добавяте колона „alternateOf“, използвана за агрегации, към хибридната таблица „%{oii_table/}“. Моля, премахнете колоната „alternateOf“.ýНе можете да създадете колона „alternateOf“, използвана за агрегации, която се позовава на хибридната таблица „%{oii_baseTable/}“ като своя BaseTable. Или направете препратка към базова таблица в режим DirectQuery, или премахнете колоната „alternateOf“.|Не можете да създадете няколко дяла в режим DirectQuery за таблицата „%{oii_table/}“. Поддържа се само един DirectQuery дял.åНе можете да създадете дял върху хибридна таблица „%{oii_table/}“ от тип entity, която се позовава на друг набор от данни на Power BI, SAP или Azure Analysis services (AAS) като източник на DirectQuery. Моля, премахнете този дял.ǮНе можете да конфигурирате таблица „%{oii_table/}“ като таблица с инкрементално обновяване и с разделение в реално време, тъй като изразът на заявката за данни се позовава на източници на данни „%d{datasourceNumber/}“. Една таблица с инкрементално обновяване и разделение в реално време може да използва само един източник на данни. Моля, модифицирайте израза на таблицата, за да използва само един източник на данни. Вижте https://go.microsoft.com/fwlink/?linkid=2172127, за да научите повече.^Свойството на "%{property/}" в обект ChangedProperty за тип родител "%{type/}" е несъвместимо.jArtifactType на "%{ArtifactType/}" в обект ExcludedArtifact за тип родител "%{parentType/}" е несъвместим.ZВече има обект FormatString changedProperty в колекцията, а дубликатите вече са разрешени.UВече има обект Caption changedProperty в колекцията, а дубликатите вече са разрешени.YВече има обект Description changedProperty в колекцията, а дубликатите вече са разрешени.[Вече има обект DisplayFolder changedProperty в колекцията, а дубликатите вече са разрешени.‰Таблицата с подробни данни „%{oii_table/}“ на alternateOf, която не е groupby (например Sum/Min/Max), трябва да е таблица на DirectQuery.’Таблицата за агрегация „%{oii_table/}“ не може да бъде в режим DirectQuery, когато таблицата с подробни данни „%{oii_basetable/}“ е в двоен режим.
combined_dataset/train/non-malicious/sample_47_62.ps1
sample_47_62.ps1
# # Module manifest for module 'OCI.PSModules.Analytics' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Analytics.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '88b806b7-e2b4-4102-95eb-65f27d654438' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Analytics Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Analytics.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAnalyticsInstance', 'Get-OCIAnalyticsInstancesList', 'Get-OCIAnalyticsPrivateAccessChannel', 'Get-OCIAnalyticsWorkRequest', 'Get-OCIAnalyticsWorkRequestErrorsList', 'Get-OCIAnalyticsWorkRequestLogsList', 'Get-OCIAnalyticsWorkRequestsList', 'Invoke-OCIAnalyticsScaleAnalyticsInstance', 'Invoke-OCIAnalyticsSetKmsKey', 'Move-OCIAnalyticsInstanceCompartment', 'Move-OCIAnalyticsInstanceNetworkEndpoint', 'New-OCIAnalyticsInstance', 'New-OCIAnalyticsPrivateAccessChannel', 'New-OCIAnalyticsVanityUrl', 'Remove-OCIAnalyticsInstance', 'Remove-OCIAnalyticsPrivateAccessChannel', 'Remove-OCIAnalyticsVanityUrl', 'Remove-OCIAnalyticsWorkRequest', 'Start-OCIAnalyticsInstance', 'Stop-OCIAnalyticsInstance', 'Update-OCIAnalyticsInstance', 'Update-OCIAnalyticsPrivateAccessChannel', 'Update-OCIAnalyticsVanityUrl' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Analytics' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_51_42.ps1
sample_51_42.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Lists the login credentials for the specified container registry. .Description Lists the login credentials for the specified container registry. .Example $Cred = Get-AzContainerRegistryCredential -ResourceGroupName "MyResourceGroup" -RegistryName "RegistryExample" $Cred.Password .Outputs Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.Api202301Preview.IRegistryListCredentialsResult .Link https://learn.microsoft.com/powershell/module/az.containerregistry/get-azcontainerregistrycredential #> function Get-AzContainerRegistryCredential { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.Api202301Preview.PSContainerRegistryCredential])] [CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='List', Mandatory)] [Alias('Name')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [System.String] # The name of the container registry. ${RegistryName}, [Parameter(ParameterSetName='List', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='GetByRegistry', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.Api202301Preview.IRegistry] # The Registry Object. ${Registry}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String[]] # The ID of the target subscription. # The value must be an UUID. ${SubscriptionId}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { if ($PSBoundParameters.ContainsKey('Registry')){ $Registry = $PSBoundParameters["Registry"] $null = $PSBoundParameters.Remove('Registry') $RegistryName = $Registry.Name $ResourceGroupName = $Registry.ResourceGroupName $null = $PSBoundParameters.Add("RegistryName", $RegistryName) $null = $PSBoundParameters.Add("ResourceGroupName", $ResourceGroupName) } $Credential = Az.ContainerRegistry.internal\Get-AzContainerRegistryCredential @PSBoundParameters $Result = New-Object Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.Api202301Preview.PSContainerRegistryCredential($Credential) return $Result } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDQKV2VQNdc6QZq # WAYYieSn8muvQsybj/XAXId1n6iPEKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC+7TxIfbq64tvXsZ4Fdd7lb # XoaTX1T0pDQSEoIpNBmBMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAa471WhRX3OMbTAiNz3xmnsbVn2KsF1l84ggziwzBj+79X6Nh75YUDwC+ # QsOo8ifI/xIsVceDJiMP6/dqMhLuu6EyUWjZ9VMIcya13UJ+ZgOaDI3JRFdbwLxD # czb1CoJu4hN7CzDU9UpPjbyc6/rz1bTvC9h2Inu3unJBWlRMGYyHbyvufBBj+AYU # IfxbWXd5mBw++s5989ljXNNLicXqH/SSjfeUm97xTKpHjUJE6G6TmItvAc2RorjE # J7dtWHEU5/L9m0DQk+KNcfdazxgU506rl68lmvXJAoGoQrZyfy+xrRE34hC0pUdo # 1y4ovn8DN4VWUciQOpvtzaSgoR2yB6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBSEzcg/1Virsxc4OGNfCrHX+Mh5idqckzuLXQZsfoQdwIGZh+2Ye9P # GBMyMDI0MDQyMzEzMTYxMy45MjNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC # OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x # sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb # aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb # 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy # S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS # 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU # bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9 # TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp # TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa # GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu # h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+ # XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg # dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI # gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr # uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld # mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd # qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa # 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL # 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC # +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg # jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL # sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH # N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6 # bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy # QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnSHRowIhgPMjAyNDA0MjMxOTQyMThaGA8yMDI0MDQyNDE5NDIxOFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dIdGgIBADAHAgEAAgINKjAHAgEAAgIRtjAKAgUA # 6dNumgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAAPWsZdCCWsEmxg1OXos # 5EufWRbruuws3CJ+wEAhXiNDRMQ7tdOCBgZR4T/JVpjAdTjbpz0afi31snq11zCb # JoH2p291ETykxGG5oDc9PUq7jhEVlu3lAa2u4xmVD6TpANJGZ4XBHaaFo4pYqZnf # +r6LSbkNZ7j7/OiTe7k9FCvYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg8jbTG+9c8DNQqcyDB1zU5OAgUPkd07O8Bmtaqt/HPoIwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34d # ezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3p5I # npafKEQ9AAEAAAHeMCIEIJZsqRmMvFYOvtIgYbW9mvW34zSiELA9VMZ+e/k6ckSa # MA0GCSqGSIb3DQEBCwUABIICADsQO2TFF5VVdVhn4c8D5yoRNrsMvUVyOfsOusGs # Q0ZEZuZQ4Sf3oMU17voeNN1H+ejh0EqykEFRDpHjV5vmeWLQkDD9qnRgZNx0gOmH # tFpIFD9Zc4nsIoe14pPZ+R7TV9viuN4GUp/cREmrFohwHHqTfPWFyC3NXb5fXKoM # pI73xeGr8t8aqGfNuF5LaQr/gKvcAV8mh3S2aLzLBRMApbiTRF+uJR3dXEKgZZ/g # 120+hgRRFURcKn0GjvYA0mMHJrZnSeYhnCJEKj8qa+gZ0g7ajwPouEZ3HyGfGwqs # FRgsejS3m61s5hOFTMoPYCDi+Xvlhilqpn41CnOLz8fqwzfjbYrb6Q3M5MjGHk5p # 55xvul5AnMd5SKkA47S2A5knJokZWka5aP1NtZjraesqT6iC06Br0NfrG54MyGsU # +hy6a8CUsF/7HAFAsG10+tNz0z3XL4SADA59iSIqan98PUxhgKWxCjnHHBZXALOO # kURECAnGPyQlDtR6h8PjTtRinuQN5r6cl3n2tKvXIn4dEH/FKK9Rhdp2Af4xSi81 # 8PO5Aq92oS4N0/TyBuguoAIwphHF0eX0upA8yrUaMzlZQczIu3Y2oWAKNZwcWOhA # XVxE/kyCxQsxwJBm40/pB+Eh1+QkA+8PluIipnv0xYmdFnvF8uK+PEpVRtnbGYWW # LdsZ # SIG # End signature block
combined_dataset/train/non-malicious/sample_46_92.ps1
sample_46_92.ps1
# # Module manifest for module 'GCArcService' # # Generated by: Microsoft # # Generated on: 08/09/2020 # @{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'GCArcService.psm1' # Version number of this module. ModuleVersion = '1.0' # ID used to uniquely identify this module GUID = 'c5d905c4-c9a5-4a0a-8115-9216509a36f5' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) 2017 Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'This module is used to install/uninstall Guest Configuration Service.' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '2.0' # Functions to export from this module FunctionsToExport = @('Install-GCArcService', 'Enable-GCArcService', 'Uninstall-GCArcService', 'Update-GCArcService') } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBECPA5J5/o6uzP # EAC976FTzZ20v0rLlWThfMKjQi2k+6CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC55 # tAOOpy5cwx25UWLszMQ4l4N/S9Dkf8RTi9D1E8wwMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAJ4dnW47j82S3qssSsNTfSye8lfAtD+juK9bL # Iwdt2EMO/JrRjqUbcZapyHJ9GDISNFGjzI7k3LJOubAxEIB/z5DnhpuClQVDJkrL # lh7AYt/0/jAU7ajmpXpVo66s503Xakcpg79r2zZeoKxLYKjoPUliZQTBY6R/lMsT # 3n9xKyRjl+P9WJTL73qO2NUTYKNmAKO9HwxYeLtbo91yn8k55FtZdBqcg1icp2Pf # 1xAG1U2lb3hoOg9wqxHrJ0Gzn/gJGUo7YQeCiER7kNcQYKCORUymRHR56FvkwUqA # 6m1zOMAt/UrtdIFs4QtU6bEmmPynfDl5S62uxn2AJFvAeV5fYqGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBxOjIhQ72mG9pNVZW4DhPGJjHzMdEG/kAW # UG+p76zRHQIGZhfVc3hdGBMyMDI0MDQxNzE0NDMyNS45OTJaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB # AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWM # v9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWO # GRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE # 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh # 3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZj # UzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr # /84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OI # GSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoP # kk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68 # UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqf # itgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74 # BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4 # dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1c # C6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk # 6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gN # nz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5 # FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikun # bUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6 # +FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL # BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGj # ZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1le # hP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Um # r8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K5 # 46k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6co7nDAi # GA8yMDI0MDQxNzEyMTQyMFoYDzIwMjQwNDE4MTIxNDIwWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDpyjucAgEAMAcCAQACAgNnMAcCAQACAhOyMAoCBQDpy40cAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAF7SDe/TQWwiwJwefuJ1MvxjtJvJ # 3vgMIzyR9yGptyKZ6NitqL9XbD90jNQOksndIxTFaOrM/6crO8FurjKlnebgj/w3 # 5LNgSiUD1qUmqmn4QrjSez6CYZNFlOHUaBkwcqADO7QDPsRusJ2VtJCvX15Q4Nh7 # /pJ3ii30WfZmy9x+de7aH3HCwjcril3qXmiDfNvkALV+UQQcmw4bL4XQAjBB50g8 # 0IxI7m0qFEIBzRp3URPIDnvugbeq7Pomd3lk52fWjHdQNYESL/+OIy9U/vC2SfRB # nEKlkIo8L+hRPe7QTvXal7zYyPDaOyMz96p+155dke0ZJZVRPxgElJpk7c0xggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecu # jy+TC08b6QABAAAB5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCD2gYsH76GrSsvBymlsrGMLdDxV # a20w81psOQZtTjfzeTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12 # aob9DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgZ+AvDXuL # UatHjYteJe6L9fJgIwRUMQF6ocnrSbQ+tywwDQYJKoZIhvcNAQELBQAEggIASc/N # p35O6h4UU+1xHBy11Pz0VQ1X4I7QAD0kgf1tUF3ygun4yFXpkkmxmSMPMNytiU+h # NEWKPyP5oFfHc2cqvWa0yrFzSGKMn/0eKDXSw2gKhYcIBy8+RuufwcG4s3/FErt4 # ONnLqeN/BUM0vKi7rR21MC7g2AfVL3HCllRdqXy8r2KoKEsxBZnKJkPU2bN12f43 # cmw4gfdnMLpAh2pHLzu2/9AynQcXjNRrHBE8bw/apPKAOUi7OYxWJ1N+ZswZvfFu # 1ATA/zrynSqRk3nm9Kx3PMB6AdtdGn0HZOsmPsn7l33HSkEgx9SulzCvK6Qp8NjL # G723NZL56W1bm1bXda5jnUINsxNqobjPtp3T7oZu2/Vj0EUhUoUEyOyk4Oj1a+8C # S2tzTM1/Ai0b8NIqAJ4OFAF0b9p+T0GT9NRoozzlEBccVwZz1E01oYX4Vc9p20BM # EvSwkjNUNIKAO8jLEgzHei2xNXQUQwlpnY48DxKcNENQRkxa6sU+M8cvCsRLNuGC # imsHb01qo0cgW2pPPCCcgjsESIIeh6gUstXFEZ6RsrlVUqDIPvRZ+Y9oqoePJgcx # VIwcuX4z1Km9byKV2+tBSsO8f3cVqRpaEywASwW81NivE06ZkfJenM/M8zzuq4nR # G8YvK5OLezpi1GeuJCdMHDv/qblH9LELDAgu2sk= # SIG # End signature block
combined_dataset/train/non-malicious/Invoke-RemoteCommand_2.ps1
Invoke-RemoteCommand_2.ps1
<# # Script FileName: func_Invoke-RemoteCommand.ps1 # Current Version: A03 # Description: Run command on a remote computer as the currently logged on user. # Created By: Adam Listek # Version Notes # A01 - Initial Release # A02 - Conversion to Function # A03 - Abstracted to generic purpose #> Function Global:Invoke-RemoteCommand { [CmdletBinding( SupportsShouldProcess=$true, ConfirmImpact="Low" )] # Terminate CmdletBinding Param ( [Parameter( ValueFromPipeline=$true, Position=0)] [String]$computerName = "localhost", [Parameter(Position=1)][String]$inputCode, [Parameter(Position=2)][String]$outputFile = "C:\\Temp\\Output.ps1", [Switch]$passthru ) # Terminate Param Begin { If ($MyInvocation.BoundParameters.Verbose -match $true) { $local:VerbosePreference = "Continue" $local:ErrorActionPreference = "Continue" $local:verbose = $true } Else { $local:VerbosePreference = "SilentlyContinue" $local:ErrorActionPreference = "SilentlyContinue" $local:verbose = $false } # Terminate If - Verbose Parameter Check # Define Internal Functions Function local:Test-AdministratorPrivileges { Write-Verbose "Get user that script context is being run in." $identity = [Security.Principal.WindowsIdentity]::GetCurrent() Write-Verbose "Create a new Security Principal object to retrieve rights." $principal = new-object Security.Principal.WindowsPrincipal $identity Write-Verbose "Retrieve if user is currently in an Administrator role." $result = $principal.IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) If ($result) { Write-Output $true } Else { Write-Output $false } # Terminate If - Result } # Terminate Function # Verify whether the current user context for the function is an Administrator If (Test-AdministratorPrivileges -Verbose:$verbose) { Write-Verbose "Function is being run as an Administrator." } Else { Write-Host "Current user, {0}, is not an Administrator." ` -F ([Security.Principal.WindowsIdentity]::GetCurrent()) ` -ForegroundColor Red Break } # Terminate Test for Administrative Privileges # Global Variables $servicePath = "C:\\Temp" $serviceName = "ps_service" } # Terminate Begin Process { # Required if running in Powershell ISE, will set for the shell also. If ($MyInvocation.BoundParameters.Debug -match $true) { # Must be set per pipeline run $local:DebugPreference = "Continue" } Else { $local:DebugPreference = "SilentlyContinue" } # Terminate If - Debug $scriptblock = { Param( $inputCode, $outputFile, $servicePath, $serviceName ) # Parse the results of the current sessions using the built-in executable, Query.exe. $results = c:\\windows\\system32\\query.exe session # Create object array of Query results $active = $results | %{ $line = $_.ToString().Split(" ") $array = $line | Where { $_ -ne "" } Switch ($array.count) { 3 { $sessionname = $array[0] $username = $null $id = $array[1] $state = $array[2] $type = $null Break } 4 { $sessionname = $array[0] $username = $array[1] $id = $array[2] $state = $array[3] $type = $null Break } 5 { $sessionname = $array[0] $username = $array[1] $id = $array[2] $state = $array[3] $type = $array[4] Break } } # Terminate Switch $object = New-Object PSObject -Property @{ sessionname = $sessionname username = $username ID = $id state = $state type = $type } Write-Output $object } | Where { $_.State -eq "Active" } If ($active) { # The data is the local Powershell script that you want to run on the remote system # Using a HereString @'' (does not parse variables within), @"" (will parse variables) Write-Verbose $outputFile Write-Verbose $inputCode # Generate the script file on the fly on the remote computer Out-File -FilePath $outputFile -InputObject $inputCode -Encoding ascii # We want to hide the powershell window and override the execution policy to make sure it runs $command = "powershell.exe -NonInteractive -WindowStyle hidden -NoLogo -File $outputFile -ExecutionPolicy RemoteSigned" $serviceDisplayName = "PS Emulate Session" Write-Verbose $command Write-Verbose $serviceDisplayName # The code to actually generate the service $source = @" using System; using System.Text; using System.Runtime.InteropServices; using System.ServiceProcess; using System.Diagnostics; namespace PS { public class Emulate : System.ServiceProcess.ServiceBase { public Emulate() { this.ServiceName = "$serviceDisplayName"; } static void Main(string[] args) { System.ServiceProcess.ServiceBase.Run(new Emulate()); } protected override void OnStart(string[] args) { base.OnStart(args); EmulateSession.StartProcessInSession($($active.Id), @"$command"); } protected override void OnStop() { base.OnStop(); } public static void WriteToEventLog(string message) { string cs = "PS_Emulate_Service"; EventLog elog = new EventLog(); if (!EventLog.SourceExists(cs)) { EventLog.CreateEventSource(cs, "Application"); } elog.Source = cs; elog.EnableRaisingEvents = true; EventLog.WriteEntry(cs, message, EventLogEntryType.Information); } } static public class EmulateSession { /* structs, enums, and external functions defined at end of code */ public static System.Diagnostics.Process StartProcessInSession(int sessionID, String commandLine) { Emulate.WriteToEventLog("Inside StartProcessInSession"); Emulate.WriteToEventLog("Session ID: " + sessionID.ToString()); IntPtr userToken; if (WTSQueryUserToken(sessionID, out userToken)) { //note that WTSQueryUserToken only works when in context of local system account with SE_TCB_NAME IntPtr lpEnvironment; Emulate.WriteToEventLog("Token: " + userToken.ToString()); if (CreateEnvironmentBlock(out lpEnvironment, userToken, false)) { Emulate.WriteToEventLog("User Env: " + lpEnvironment.ToString()); StartupInfo si = new StartupInfo(); si.cb = Marshal.SizeOf(si); si.lpDesktop = "winsta0\\\\default"; si.dwFlags = STARTF.STARTF_USESHOWWINDOW; // Using the SW_HIDE will make the window hidden, see in the bottom section for more commands si.wShowWindow = ShowWindow.SW_HIDE; ProcessInformation pi; // Note the CreationFlags, they make this work as it must have both the CREATE_NEW_CONSOLE and CREATE_UNICODE_ENVIRONMENT if (CreateProcessAsUser(userToken, null, new StringBuilder(commandLine), IntPtr.Zero, IntPtr.Zero, false, CreationFlags.CREATE_NEW_CONSOLE | CreationFlags.CREATE_UNICODE_ENVIRONMENT, lpEnvironment, null, ref si, out pi)) { CloseHandle(pi.hThread); CloseHandle(pi.hProcess); //context.Undo(); try { return System.Diagnostics.Process.GetProcessById(pi.dwProcessId); } catch (ArgumentException) { // I had to remove the ArgumentException e (I removed the e), it threw up a compiler warning //The process ID couldn't be found - which is what always happens because it has closed return null; } } else { Emulate.WriteToEventLog("Could Not Create Process."); int err = Marshal.GetLastWin32Error(); throw new System.ComponentModel.Win32Exception(err, "Could not create process.\\nWin32 error: " + err.ToString()); } } else { Emulate.WriteToEventLog("Could not create environment block."); int err = Marshal.GetLastWin32Error(); throw new System.ComponentModel.Win32Exception(err, "Could not create environment block.\\nWin32 error: " + err.ToString()); } } else { Emulate.WriteToEventLog("No Token"); int err = System.Runtime.InteropServices.Marshal.GetLastWin32Error(); if (err == 1008) return null; //There is no token throw new System.ComponentModel.Win32Exception(err, "Could not get the user token from session " + sessionID.ToString() + " - Error: " + err.ToString()); } } [DllImport("wtsapi32.dll", SetLastError = true)] static extern bool WTSQueryUserToken(Int32 sessionId, out IntPtr Token); [DllImport("userenv.dll", SetLastError = true)] static extern bool CreateEnvironmentBlock(out IntPtr lpEnvironment, IntPtr hToken, bool bInherit); [DllImport("advapi32.dll", SetLastError = true, CharSet = CharSet.Auto)] static extern bool CreateProcessAsUser(IntPtr hToken, String lpApplicationName, [In] StringBuilder lpCommandLine, IntPtr /*to a SecurityAttributes struct or null*/ lpProcessAttributes, IntPtr /*to a SecurityAttributes struct or null*/ lpThreadAttributes, bool bInheritHandles, CreationFlags creationFlags, IntPtr lpEnvironment, String lpCurrentDirectory, ref StartupInfo lpStartupInfo, out ProcessInformation lpProcessInformation); [DllImport("kernel32.dll", SetLastError = true)] static extern bool CloseHandle(IntPtr hHandle); [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)] struct StartupInfo { public Int32 cb; public String lpReserved; public String lpDesktop; public String lpTitle; public Int32 dwX; public Int32 dwY; public Int32 dwXSize; public Int32 dwYSize; public Int32 dwXCountChars; public Int32 dwYCountChars; public Int32 dwFillAttribute; public STARTF dwFlags; public ShowWindow wShowWindow; public Int16 cbReserved2; public IntPtr lpReserved2; public IntPtr hStdInput; public IntPtr hStdOutput; public IntPtr hStdError; } [StructLayout(LayoutKind.Sequential)] internal struct ProcessInformation { public IntPtr hProcess; public IntPtr hThread; public int dwProcessId; public int dwThreadId; } /// <summary> /// The following process creation flags are used by the CreateProcess, CreateProcessAsUser, CreateProcessWithLogonW, and CreateProcessWithTokenW functions. They can be specified in any combination, except as noted. /// </summary> [Flags] enum CreationFlags : int { /// <summary> /// Not specified by MSDN??? /// </summary> NONE = 0, /// <summary> /// The calling thread starts and debugs the new process and all child processes created by the new process. It can receive all related debug events using the WaitForDebugEvent function. /// A process that uses DEBUG_PROCESS becomes the root of a debugging chain. This continues until another process in the chain is created with DEBUG_PROCESS. /// If this flag is combined with DEBUG_ONLY_THIS_PROCESS, the caller debugs only the new process, not any child processes. /// </summary> DEBUG_PROCESS = 0x00000001, /// <summary> /// The calling thread starts and debugs the new process. It can receive all related debug events using the WaitForDebugEvent function. /// </summary> DEBUG_ONLY_THIS_PROCESS = 0x00000002, /// <summary> /// The primary thread of the new process is created in a suspended state, and does not run until the ResumeThread function is called. /// </summary> CREATE_SUSPENDED = 0x00000004, /// <summary> /// For console processes, the new process does not inherit its parent's console (the default). The new process can call the AllocConsole function at a later time to create a console. For more information, see Creation of a Console. /// This value cannot be used with CREATE_NEW_CONSOLE. /// </summary> DETACHED_PROCESS = 0x00000008, /// <summary> /// The new process has a new console, instead of inheriting its parent's console (the default). For more information, see Creation of a Console. /// This flag cannot be used with DETACHED_PROCESS. /// </summary> CREATE_NEW_CONSOLE = 0x00000010, /// <summary> /// The new process is the root process of a new process group. The process group includes all processes that are descendants of this root process. The process identifier of the new process group is the same as the process identifier, which is returned in the lpProcessInformation parameter. Process groups are used by the GenerateConsoleCtrlEvent function to enable sending a CTRL+BREAK signal to a group of console processes. /// If this flag is specified, CTRL+C signals will be disabled for all processes within the new process group. /// This flag is ignored if specified with CREATE_NEW_CONSOLE. /// </summary> CREATE_NEW_PROCESS_GROUP = 0x00000200, /// <summary> /// If this flag is set, the environment block pointed to by lpEnvironment uses Unicode characters. Otherwise, the environment block uses ANSI characters. /// </summary> CREATE_UNICODE_ENVIRONMENT = 0x00000400, /// <summary> /// This flag is valid only when starting a 16-bit Windows-based application. If set, the new process runs in a private Virtual DOS Machine (VDM). By default, all 16-bit Windows-based applications run as threads in a single, shared VDM. The advantage of running separately is that a crash only terminates the single VDM; any other programs running in distinct VDMs continue to function normally. Also, 16-bit Windows-based applications that are run in separate VDMs have separate input queues. That means that if one application stops responding momentarily, applications in separate VDMs continue to receive input. The disadvantage of running separately is that it takes significantly more memory to do so. You should use this flag only if the user requests that 16-bit applications should run in their own VDM. /// </summary> CREATE_SEPARATE_WOW_VDM = 0x00000800, /// <summary> /// The flag is valid only when starting a 16-bit Windows-based application. If the DefaultSeparateVDM switch in the Windows section of WIN.INI is TRUE, this flag overrides the switch. The new process is run in the shared Virtual DOS Machine. /// </summary> CREATE_SHARED_WOW_VDM = 0x00001000, /// <summary> /// The process is to be run as a protected process. The system restricts access to protected processes and the threads of protected processes. For more information on how processes can interact with protected processes, see Process Security and Access Rights. /// To activate a protected process, the binary must have a special signature. This signature is provided by Microsoft but not currently available for non-Microsoft binaries. There are currently four protected processes: media foundation, audio engine, Windows error reporting, and system. Components that load into these binaries must also be signed. Multimedia companies can leverage the first two protected processes. For more information, see Overview of the Protected Media Path. /// Windows Server 2003 and Windows XP/2000: This value is not supported. /// </summary> CREATE_PROTECTED_PROCESS = 0x00040000, /// <summary> /// The process is created with extended startup information; the lpStartupInfo parameter specifies a STARTUPINFOEX structure. /// Windows Server 2003 and Windows XP/2000: This value is not supported. /// </summary> EXTENDED_STARTUPINFO_PRESENT = 0x00080000, /// <summary> /// The child processes of a process associated with a job are not associated with the job. /// If the calling process is not associated with a job, this constant has no effect. If the calling process is associated with a job, the job must set the JOB_OBJECT_LIMIT_BREAKAWAY_OK limit. /// </summary> CREATE_BREAKAWAY_FROM_JOB = 0x01000000, /// <summary> /// Allows the caller to execute a child process that bypasses the process restrictions that would normally be applied automatically to the process. /// Windows 2000: This value is not supported. /// </summary> CREATE_PRESERVE_CODE_AUTHZ_LEVEL = 0x02000000, /// <summary> /// The new process does not inherit the error mode of the calling process. Instead, the new process gets the default error mode. /// This feature is particularly useful for multi-threaded shell applications that run with hard errors disabled. /// The default behavior is for the new process to inherit the error mode of the caller. Setting this flag changes that default behavior. /// </summary> CREATE_DEFAULT_ERROR_MODE = 0x04000000, /// <summary> /// The process is a console application that is being run without a console window. Therefore, the console handle for the application is not set. /// This flag is ignored if the application is not a console application, or if it is used with either CREATE_NEW_CONSOLE or DETACHED_PROCESS. /// </summary> CREATE_NO_WINDOW = 0x08000000, } [Flags] public enum STARTF : uint { STARTF_USESHOWWINDOW = 0x00000001, STARTF_USESIZE = 0x00000002, STARTF_USEPOSITION = 0x00000004, STARTF_USECOUNTCHARS = 0x00000008, STARTF_USEFILLATTRIBUTE = 0x00000010, STARTF_RUNFULLSCREEN = 0x00000020, // ignored for non-x86 platforms STARTF_FORCEONFEEDBACK = 0x00000040, STARTF_FORCEOFFFEEDBACK = 0x00000080, STARTF_USESTDHANDLES = 0x00000100, } public enum ShowWindow : short { SW_HIDE = 0, SW_SHOWNORMAL = 1, SW_NORMAL = 1, SW_SHOWMINIMIZED = 2, SW_SHOWMAXIMIZED = 3, SW_MAXIMIZE = 3, SW_SHOWNOACTIVATE = 4, SW_SHOW = 5, SW_MINIMIZE = 6, SW_SHOWMINNOACTIVE = 7, SW_SHOWNA = 8, SW_RESTORE = 9, SW_SHOWDEFAULT = 10, SW_FORCEMINIMIZE = 11, SW_MAX = 11 } } } "@ Write-Verbose $source # Using the OutputAssembly and OutputType we can make an executable out of this. It requires the System.ServiceProcess assembly also to inherit the ServiceBase class. Add-Type -TypeDefinition $source -Language CSharpVersion3 -OutputAssembly ("$servicePath$serviceName.exe") -OutputType ConsoleApplication -ReferencedAssemblies "System.ServiceProcess" # Use WMI to create the service, it does not require DesktopInteract # The computer is the localhost cause this code will be run on the remote computer locally. $computer = "." $class = "Win32_Service" $method = "Create" $mc = [wmiclass]"\\\\$computer\\ROOT\\CIMV2:$class" $inparams = $mc.PSBase.GetMethodParameters($method) $inparams.DesktopInteract = $false $inparams.DisplayName = $serviceDisplayName $inparams.ErrorControl = 0 $inparams.LoadOrderGroup = $null $inparams.LoadOrderGroupDependencies = $null $inparams.Name = $serviceDisplayName.Replace(" " ,"_") $inparams.PathName = ("$servicePath$serviceName.exe") $inparams.ServiceDependencies = $null $inparams.ServiceType = 16 $inparams.StartMode = "Automatic" # Will start as localsystem builtin if null $inparams.StartName = $null $inparams.StartPassword = $null # Invoke the WMI method to create a service $result = $mc.PSBase.InvokeMethod($method,$inparams,$null) Start-Service -DisplayName $serviceDisplayName # Loop until the child process of Powershell.exe is gone. $baseproc = Get-WMIObject Win32_Process | Where { $_.Name -eq $serviceName } While (Get-WMIObject Win32_Process | Where { $_.ParentProcessId -eq $baseproc.ProcessId }) { Sleep 1 } # Terminate While Stop-Service -DisplayName $serviceDisplayName # Use sc.exe to delete the service, if you only use WMI to do this, it will not disappear until next restart, this deletes it immediately C:\\Windows\\System32\\sc.exe delete $serviceDisplayName.Replace(" " ,"_") | Out-Null # Clean up created files Remove-Item -Path ("$servicePath$serviceName.exe") -Force Remove-Item -Path ("$servicePath$serviceName.pdb") -Force Remove-Item -Path $outputFile -Force } Else { Write-Host "No active sessions" } # Terminate If - Active User } # Terminate Scriptblock If (Test-Connection $computerName -Quiet) { Try { Invoke-Command ` -ComputerName $computerName ` -ScriptBlock $scriptblock ` -ArgumentList $inputCode,$outputFile,$servicePath,$serviceName } Catch { Write-Warning "Unable to create remote session: $($_.Exception.Message)" Break } # Terminate Try-Catch } # Terminate If - Test Connection } # Terminate Process <# .SYNOPSIS Invoke remote code impersonating the currently logged on user. .PARAMETER computername Computer to run the remote code on. .PARAMETER inputCode The code to run on the remote computer. .PARAMETER outputFile The output data from a file. .INPUTS The input is a computer. .OUTPUTS The output is the returned data from .EXAMPLE C:\\PS> $code = "Out-File -FilePath c:\\temp\\output.txt -InputObject ([Security.Principal.WindowsIdentity]::GetCurrent())" C:\\PS> Invoke-RemoteCommand -inputCode $code #> } # Terminate Function
combined_dataset/train/non-malicious/Generate Random Data.ps1
Generate Random Data.ps1
$dictionaryWords = gc $dictionaryFile $azLower = 'abcdefghijklmnopqrstuvwxyz'.ToCharArray() $azUpper = 'ABCDEFGHIJKLMNOPQRSTUVWXYZ'.ToCharArray() $hex = '012345679ABCDEF'.ToCharArray() $digit = '0123456789'.ToCharArray() $alphanumeric = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789'.ToCharArray() function RandomVIN { $url = 'http://randomvin.com/getAjax.php?qry=random&str=random&p9=0' $client = New-Object System.Net.WebClient $client.DownloadString($url).SubString(4,17) } function RandomWord { $dictionaryWords | Get-Random } function RandomString([int] $len, [Array] $charSet = $azLower) { [String]::Join('', (1..$len | % { $charSet | Get-Random })) } function RandomPlate { (RandomString -len 3 -charset $azUpper) + "-" + (Get-Random -min 100 -max 999) } function RandomIPv4 { [IPAddress]::Parse([String] (Get-Random) ) } function RandomHexByte { "{0:X2}" -f (Get-Random -Minimum 0 -Maximum 255) } function RandomMAC { [String]::Join(":", (1..8 | % { RandomHexByte })) } function RandomDateTime { ([DateTime]::Now).AddYears((Get-Random -min -1 -max 1)).AddMonths((Get-Random -min -11 -max 11)).AddDays((Get-Random -min -30 -max 30)).AddHours((Get-Random -min -23 -max 23)).AddMinutes((Get-Random -min -59 -max 59)).AddSeconds((Get-Random -min -59 -max 59)) }